Digital Infrastructure - Subject Guide
Digital Infrastructure - Subject Guide
Digital Infrastructure - Subject Guide
Digital
infrastructures
for business
M. Hercheui
T. Cornford
IS1181
2022
Digital infrastructures
for business
M. Hercheui
T. Cornford
IS1181
2022
Undergraduate study in
Economics, Management,
Finance and the Social Sciences
This subject guide is for a 100 course offered as part of the University of London
undergraduate study in Economics, Management, Finance and the Social
Sciences. This is equivalent to Level 4 within the Framework for Higher Education
Qualifications in England, Wales and Northern Ireland (FHEQ).
For more information, see: london.ac.uk
This guide was prepared for the University of London by:
Dr Magda Hercheui, UCL School of Management, University College London.
Dr Tony Cornford, Department of Management, London School of Economics and
Political Science.
This is one of a series of subject guides published by the University. We regret that
due to pressure of work the authors are unable to enter into any correspondence
relating to, or arising from, the guide. If you have any comments on this subject
guide, favourable or unfavourable, please use the form at the back of this guide.
University of London
Publications Office
Stewart House
32 Russell Square
London WC1B 5DN
United Kingdom
london.ac.uk
Published by: University of London
© University of London 2022
The University of London asserts copyright over all material in this subject guide
except where otherwise indicated. All rights reserved. No part of this work may be
reproduced in any form, or by any means, without permission in writing from the
publisher. We make every effort to respect copyright. If you think we have inadvert-
ently used your copyright material, please let us know.
Contents
Contents
i
IS1181 Digital infrastructures for business
ii
Contents
iv
Chapter 1: Introduction to the course
1
IS1181 Digital infrastructures for business
2
Chapter 1: Introduction to the course
3
IS1181 Digital infrastructures for business
1.3 Syllabus
The course provides an introductory understanding of the concept of an
infrastructure with a particular focus is on the digital infrastructures that
underpin so much of business, government and social life – including the
internet and world wide web and the many other systems and services
that build upon these. Concepts and theories are introduced that help
understand the emergence of digital infrastructures, their architecture
(structure), their economics and the kinds of services they offer including
access to data services and communications capacity.
Students learn to apply a critical perspective to this topic, developing
understanding in how to exploring the opportunities and risks of
these infrastructures as seen by various groups of people. The course
considers the issues and challenges faced by decision makers in
government, businesses and infrastructure provider organisations as
digital infrastructures become more central in economic and social life.
This includes issues of national and international standards, laws and
regulation. The course also addresses these issues as they relate to the
individual user of digital services.
To provide focus and depth, the course focuses on the internet as our most
general and fundamental digital infrastructure for communication and the
world wide web as the core information infrastructure. It also considers
three other digital infrastructures of relevance today: cloud computing,
mobile devices and services and social media. You will learn the key
characteristics of the technologies that underpin each case, how these
infrastructures have emerged and how they are being used by individuals,
businesses and governments. The course allows students to obtain a robust
understanding of the theoretical underpinnings of current developments
in digital infrastructures and to apply this to other contemporary examples
including concepts of platforms, business model innovation and the
Internet of Things (IoT).
4
Chapter 1: Introduction to the course
The subject guide also refers to books. When these books are not available
in the local library or online, you can try to find the referred chapters
online on Google Books. Some authors make electronic copies of their
books available. Authors also may have online papers which discuss similar
topics as the books. Finally, you can use the virtual learning environment
(VLE) resources, as discussed below in section 1.6.4. For those who like
learning from videos, we recommend you search for experts in the fields of
your interest, to learn from a variety of professionals.
6
Chapter 1: Introduction to the course
8
Chapter 1: Introduction to the course
Ryan, J. A history of the internet and the digital future. (London: Reaktion
Books, 2013) [ISBN 9781780231129].
This book is a very readable and chronological history of the internet, with
lots of sources of data referenced. We recommend in particular Chapter 8
on ‘The Web’.
Yoo, Y. ‘Digital materiality and the emergence of an evolutionary science of
the artificial’ in Leonardi, P., B. Nardi and J. Kallinikos (eds) Materiality
and organizing: social interaction in a technological world. (Oxford: Oxford
University Press, 2013) [ISBN 9780199664054] pp.134–54.
1.6.4 Online study resources (the Online Library and the VLE)
In addition to the subject guide and the Essential reading, it is crucial that
you take advantage of the study resources that are available online for this
course, including the VLE and the Online Library.
You can access the VLE, the Online Library and your University of London
email account via the Student Portal.
You should have received your login details for the Student Portal with
your official offer, which was emailed to the address that you gave
on your application form. You have probably already logged in to the
Student Portal in order to register! As soon as you registered, you will
automatically have been granted access to the VLE, Online Library and
your fully functional University of London email account.
If you have forgotten these login details, please click on the ‘Forgotten
your password’ link on the login page.
The VLE
The VLE, which complements this subject guide, has been designed to
enhance your learning experience, providing additional support and a
sense of community. It forms an important part of your study experience
with the University of London and you should access it regularly.
The VLE provides a range of resources for EMFSS courses:
• Course materials: Subject guides and other course materials
available for download. In some courses, the content of the subject
guide is transferred into the VLE and additional resources and
activities are integrated with the text.
• Readings: Direct links, wherever possible, to essential readings in the
Online Library, including journal articles and ebooks.
• Video content: Including introductions to courses and topics within
courses, interviews, lessons and debates.
• Screencasts: Videos of PowerPoint presentations, animated podcasts
and on-screen worked examples.
• External material: Links out to carefully selected third-party
resources.
• Self-test activities: Multiple-choice, numerical and algebraic
quizzes to check your understanding.
• Collaborative activities: Work with fellow students to build a body
of knowledge.
• Discussion forums: A space where you can share your thoughts
and questions with fellow students. Many forums will be supported by
a ‘course moderator’, a subject expert employed by LSE to facilitate the
discussion and clarify difficult topics.
9
IS1181 Digital infrastructures for business
10
Chapter 2: Infrastructures: conceptual beginnings
Chapter outline
This chapter introduces the concept of infrastructures. It discusses the
concept itself and emphasises the importance of infrastructures in the
development of forms of production in the economy and organisation
of society. We argue here that just as roads and railways and electricity
grids were core infrastructures of the 19th and 20th centuries,
digital technologies have become fundamental infrastructures in our
contemporary world. Of course, roads, railways and electricity are still
important for us, but the digital infrastructures discussed here are at the
heart of how society and the economy develop today. We argue that the
emergence of digital infrastructures has serious implications for how
well countries, industries, corporations and people make use of digital
technologies, devices and services. This chapter introduces examples of
digital infrastructures which are discussed across the course. In particular,
we introduce here five examples of digital infrastructures: the internet, the
WWW, cloud computing, mobile technologies and social media. Later in
this subject guide each of these examples are discussed in more detail in
their own chapter, using the theoretical lenses presented in the guide.
2.1 Introduction
From a historical perspective, infrastructures have long been seen
as important for economic and social development. For example,
the establishment of railways in the USA in the 19th century, or the
constructions of separate fresh water and sewage systems for European
cities in the same century were fundamental to economic and social
progress. In the 20th century it is perhaps the road system, telephones
and the electricity grid that we can identify as the outstanding and
fundamental infrastructures that drove change. In our own era, in the
third decade of the 21st century, digital technologies and the services they
provide are understood as similarly fundamental infrastructures for our
societies and our economy.
Developing and using digital infrastructures has significant implications
for all countries and their governments often shape policies to promote
their development while sone companies make the provision of digital
infrastructure their primary business. This emphasis on infrastructures
is often justified by a belief that infrastructures drive the adoption of
digital technologies that in turn provide economic and social benefits.
For example, when developing countries in sub-Saharan Africa adopt
smartphones, they thereby stimulate all sorts of economic and social
improvements. Because of the existence of a good mobile phone
infrastructure, including phone masts for wider coverage and pay-as-
you-go phone rental, new services can be offered and new businesses can
be developed. Similarly, digital entrepreneurs can start new businesses
in London, São Paulo, Shanghai, or Singapore, in part because these
cities provide excellent 4G and broadband availability. And, of course,
other cities and other countries are also eager to find similar economic
development opportunities.
11
IS1181 Digital infrastructures for business
Wikipedia
Infrastructures: https://en.wikipedia.org/wiki/Infrastructure
Critical infrastructures: https://en.wikipedia.org/wiki/Critical_infrastructure
Before we had this power supply infrastructure, the situation was not so
comfortable. Even when the technology for producing electricity had been
developed, very few companies and households had the resources to adopt
the new kind of power. Companies and households could install equipment
for producing electricity (generators) and use this locally – but supply
equipment had to be installed very close to the place of consumption. In
that period, electricity was a great invention but one that only brought
advantage for a few who could afford it, but not much for the rest.
The situation changed as governments and entrepreneurs came to
understand that larger numbers of people and businesses could benefit
from having access to an electricity supply. However, in order to make this
possible, it was necessary to change the model for generating electricity.
Instead of having a myriad of small local plants, it was necessary to have
larger, centralised units to produce electricity at a lower cost (economies
of scale). These units would not in general be local, so it was necessary
to build a network of cables to deliver electricity across large distances
and distribute it to multiple sites. There was then the problem as to how
to deliver the electricity for each house or building. Technical standards
and rules of operation needed to be agreed among industries, technical
bodies and governments, allowing the connection of individual buildings
and houses to the network, in a safe and regulated manner. And of course,
there was a need for an organisational structure too, the electricity supply
facilities (power stations, cables etc.) needed to manage on a day-to-day
basis, bills needed to be issued and new investments made to upgrade and
grow the electricity system.
Having a standard ‘kind’ of electricity (for example 230v, 50Hz in a
European country, but 110v, 60 Hz in the USA/North America) and a
standard kind of plug and socket made the social and organisational
arrangements easier too. For a worldwide overview of all the different
electricity standards we have today see the plug voltage by country. There
are still a surprising number. With agreed standards, consumers in a
country can go into a shop and easily purchase a refrigerator ready to be
plugged in and work (what today in computers is sometimes called ‘plug
and play’). Manufacturers also benefit since they only need to make a few
models to supply the whole world, even if they do need to put different
plugs on the cables. And both consumers and manufacturers benefit from
having regulations that define quality and safety standards, plugs and
sockets and rules for pricing.
The building of the power supply networks has taken a long of time –
over 140 years in the UK. The original model of individual power supply
units was gradually substituted over decades by the centralised and
shared resource model. New services were offered first in a few cities and
gradually increased places were integrated to the network of power supply.
The scale has become huge, reaching national levels and interconnecting
networks across countries when the production of electricity is done in one
country and sold to another. Importantly, as the scale has become as bigger
it has allowed a reduction in the cost of electricity, benefiting all in the
same network.
So here we are today in a world when most of us, but not all of us, take it
for granted that our buildings have plenty of electricity available on tap,
thanks to an established electrical infrastructure.
However, we need to understand that the emergence of infrastructures
is not always smooth. When the power supply was provided locally, the
technical arrangements were done locally too, thus it was difficult to
15
IS1181 Digital infrastructures for business
Activity 2.1: How train networks and water supply have become national
infrastructures
You have learnt in this section how power supply networks became common and shared
infrastructures. In this activity, you do your own research to understand how either rail
networks or water supply have evolved as infrastructures. You can research the process
in your own country, or you can investigate the case of national rail network in another
country – the United Kingdom or the USA for example.
You should first establish, based on the ideas discussed above, to what extent the
railways system or water supply is worthy to be called a national infrastructure – perhaps
more in some countries than in others. Then you should find two or three examples of
how disparate and ‘local’ rail or water supplies have been transformed and integrated to
become part of a larger whole with common characteristics and economies of scale.
The objective of this activity is for you to better understand how technology innovation
will sometimes evolve to create an important infrastructure. In the United Kingdom,
the rail network was originally fragmented. Each part of the network followed different
standards, including the width of tracks and the timetables. Moving across the
network was very difficult, engines and trucks could not pass around the country and
manufacturers had to serve the multiple needs of different railways asking for different
products. It took a lot of time and effort to make the fragmented rail network something
worthy to be called a national infrastructure.
This activity also helps you to develop your research and self-study skills, which are
fundamental for preparing you for continuing learning.
17
IS1181 Digital infrastructures for business
Scenario 1:
John produces vegetables in a small village with poor power supply,
transportation and communication infrastructures. Like any small farmer,
he struggles with the weather to get good quality products which can
reach the market. As he does not have a good power supply, he cannot
afford to have refrigerated rooms for the products, implying he needs
to sell the production very quickly. The quality of his vegetables could
be better with a little bit of mechanisation, but so far this has not been
possible as he cannot rely in the supply of electricity. However, John
faces other obstacles. Living in a small village means he cannot rely on
the transport network to get his product to the market in the closest big
city. Sometimes the roads are working, sometimes not. It depends on
how much the rain season has destroyed the roads. John would like very
much to have further markets, but this is not possible. In addition to not
have means for transporting the goods, he also does not have means to
communicate efficiently with other markets or wholesalers. The telephone
network is very poor in his village and it is expensive as well. He even
cannot afford to regularly communicate with the retailers in the big city to
negotiate the price of his goods. He depends mainly on a single wholesaler
who visits the village once per week – when the weather helps! – to buy
his products. And John accepts the price offered by the wholesaler as he
does not have an alternative.
Scenario 2:
Anne produces vegetables in a small village which is well connect to power
supply, transportation and communication infrastructures. As electricity is
accessible and affordable, Anne has invested in mechanical irrigation and
refrigerated rooms to keep her products fresh for longer periods. Through
the internet, Anne gets all information she needs to better cultivate her
vegetables and to know exactly what the markets are willing to buy. She
has segmented her production to different markets. Most of her production
goes to the nearest big city. She is informed daily about the prices in the
market and can send fresh products regularly, using the efficient transport
networks. The intermediary makes a fair amount of money, but he is not
able to manipulate prices, as Anne has information about the prices and
demands of each of her products. The other part of Anne’s production is
exported. Knowing about the demands in other countries, she has joined
a network of small farms which collaborates to get the fresh products
from the farm and transport them by plane. In a matter of few days, fresh
products can leave Ann’s farm and reach households and restaurants in
other countries. Ann monitors the prices and the markets daily and she
can quickly redirect her production either to the nearest city or to other
countries, getting the benefit of the best price.
The examples show in a very small scale how and why infrastructures
matter. The more countries invest in energy, transportation and
communication infrastructures, the more they have advantages in creating
more competitive and efficient production models. It is not only about the
use of technology, such as in our example the use of refrigerated rooms
and better transportation systems. It is also about the quality and timing of
information to make decisions. The forms of organising production, with
a fairer distribution of wealth among entrepreneurs in the value chain
and better access to different markets, can improve both competitiveness
and fairness in society – as for example giving small rural farmers a better
opportunity to sell their products and make profits to reinvest in their
enterprises.
18
Chapter 2: Infrastructures: conceptual beginnings
19
IS1181 Digital infrastructures for business
Figure 2.1: Six core concepts for identifying a digital infrastructure (Adapted
from Hanseth and Bygstad, 2015)
20
Chapter 2: Infrastructures: conceptual beginnings
generate better returns. Based on this data, the supermarket chain may
make decisions on where to open new stores, which products and services
will sell better in particular stores and how to perform the logistic and the
operations of the day considering the needs of each store.
Focusing on the software aspect, we can see that a supermarket chain such
as Walmartm relies on different pieces of technology, such as supply chain
management, customer relationship management, the internet, databases
and data analytics. With a little bit of research, we could find that indeed
the whole Walmart business is integrated into an enterprise resource
planning software, which integrates all these elements with others,
which manage, for instance, the financial and human resources aspects
of the company. We could also find that a variety of interfaces is used for
digital marketing, including Google, Facebook and owned channels
(e.g. Walmart’s or Amazon’s own pages) and that many different digital
tools are used to explore sentiments and customers’ disposition to spend
(individually or in clusters).
In other words, we can observe that Walmart depends on a complex and
extensive digital infrastructure to make its business possible and profitable
and that this infrastructure has many elements and many layers that work
together to deliver more value to the supermarket’s shareholders. Some of
these are internal and some are external to the organisation.
Walmart can only make this extensive use of digital systems because there
is a bigger network that connects the firm to other businesses, which also
use similar pieces of software and decide to communicate in the same way.
Walmart can adopt digital marketing because its potential customers are
online, using Google and Facebook and researching prices on different
websites. Walmart can use the internet to improve customer service
because consumers go online to put forward their complaints and expect
to receive feedback using the same channel. So Walmart creates for itself
an infrastructure that is embedded in a larger digital infrastructure (the
internet, Google, Facebook, the world wide web etc.), which is a legitimate
business base for any number of other companies. Indeed, companies that
do not adopt such digital infrastructures increase their chances of going
out of business as the market moves towards digital environments.
21
IS1181 Digital infrastructures for business
The more globalised and competitive the world is and the shorter product
life cycles are, the more relevance being able to innovate is seen to have for
businesses and economics. Keeping making profits, holding market share
and sustaining the relative capacity for generating wealth in an environment
of globalisation and climate change demands that economies keep up the
process of innovation. This is true for national or regional economies and
for individual firms looking for a sustainable/viable future. We expect
other positive benefits from innovation too, independently of them keeping
companies profitable or countries economically healthy. These may include
things such as environmental benefits (innovation in green technologies),
social wellbeing (innovation in educational technologies), health (innovation
in medicines, diagnostics and treatments), happiness and safety (innovation
is social and cultural norms).
There is a view that sees innovation – change in how things are done
and are understood – as the central driver of our economies; what the
economist Joseph Schumpeter called the ‘gales of creative destruction’. Out
with the old, on to the new. His idea was that pursuing new or different
things (products) or new different ways to do things (processes) created
opportunities for more and different kinds of economic activity. As new
ideas gain traction in the economy, inefficiencies or vested interests
are swept away in the gale, leading to a different more productive and
perhaps socially more agreeable future. Today we might see these gales in
areas such as the move to a new greener and low carbon economy, or the
challenge that Fintech companies pose to traditional banks.
Tidd and Bessant (2013, p.19) present many definitions of what
‘innovation’ means. One that is very short and precise is: ‘Innovation is the
successful exploitation of new ideas’ (as defined by the Innovation Unit, UK
Department of Trade and Industry, in 2004). Innovation using this approach
is not principally about having new ideas or even inventing something;
rather, innovation is the process of growing new ideas into practical use
(Tidd and Bessant, 2013). Following this line of thought, the process of
innovation starts in searching for an interesting pool of ideas, in selecting
from this idea which seem more promising and then trying to put these
ideas to some practical and value-adding use. This is, in a general way,
what biotech industries and start-ups do or what venture capital funds seek
to achieve. This view of innovation certainly fits with the account of the
development of the internet as set out in Chapter 3 of this subject guide.
We might also include a final stage of innovation as capturing value from an
innovation – remembering that there is not always a simple and direct link
between who leads the innovation, who benefits from it and who gets rich!
Tidd and Bessant (2013) go on to suggest that innovation can happen
in four key areas, rather similar to the ideas introduced in the opening
paragraph of this section. The most obvious one they suggest is innovation
in products and services themselves. The second is innovation in processes
(i.e. changes in the way products and services are created and delivered).
The third is innovation in position, when the innovation changes the
context in which products and services are introduced. And the last area
is innovation in paradigms, when the changes affect the mental models
(including business models) which define the way organisations or social
and economic systems works. Each of these four areas of innovation are
relevant for our goal of better understanding the dynamics of digital
infrastructures and their impact in organisations, markets and society. Of
course, any given innovation may have consequences in more than one of
these four areas.
22
Chapter 2: Infrastructures: conceptual beginnings
The ideas on innovation introduced here are used across this subject
guide. We explore how particular technologies can be understood as
innovation both in the development of digital infrastructures themselves
(e.g. WWW and internet) and in what they come to be used for – a topic
discussed in depth in Chapters 11, 12 and 13. We also discuss innovation
from the perspective of new digital products and services (Chapter 14) and
innovation (doing new things, finding new ways) from the perspective of
digital business platforms and new business models (Chapters 17 and 18).
In Chapter 19 we discuss some aspects of how we perhaps can innovate
the way we live in smart cities.
The internet
In 2021, the internet was used by around 63% of the worldwide
population, i.e. 4.9 billion people had access to the internet (International
Telecommunications Union, ITU). Every day more people get access thus
23
IS1181 Digital infrastructures for business
this number is growing. However, this number also shows that 2.9 billion
people still do not have access to the internet, with all the negative
consequences of being on the wrong side of the digital divide.
You probably have quite a good understanding of the internet from
the perspective of a user. You probably also understand that the other
infrastructures that we introduce here (WWW, Cloud, Mobile and social
media) are all themselves developments that use the internet. One way
to express this is to say that they all sit ‘on top’ of the internet. You could
also say that they are created out of the internet and that the internet is
a key part of their installed base. We will come back to this idea of one
infrastructure ‘sitting on top’ of another more formally in Chapter 6 and
explore the idea of an ‘installed base’ in Chapter 7, but for the moment we
ask you to take a common sense understanding of what we mean.
The internet itself is a network of connected computers and computer
networks, which extends across the world – a network of networks. The
internet is a complicated kind of thing made up of:
• physical hardware and software (computers, cables, satellites,
programmes, devices etc.)
• a common set of rules or standards that it operates by, in particular the
protocol for the exchange of data between the computers (TCP/IP)
• a complex set of organisations and institutions that govern and
manage the service and help it to develop.
What makes the internet something special and distinguishes it from other
digital communications services, is the way it connects computers using
an open standard (TCP/IP) allowing any connected computer can access
any other. Closed computer networks may allow communication within
defined boundaries (e.g. for a government, a particular firm, a sector of
industry). But the internet is open: it offers unlimited access, so long as
you are in a country which does not block content through firewalls and
filters. Anyone can add new computers to the network, as long as the
standard communication protocol is used. And the internet itself has no
concern with the content of the messages it transmits.
However, what really makes the internet unique and fundamental is the
willingness of people, organisations, institutions, governments, charities,
non-governmental organisations and any sort of organised group to pass
messages and digital content through the network, to look for content
across the network and to communicate through the network. The internet
has become the world’s preeminent digital infrastructure precisely because
all these social actors have decided to publish and find content and to
communicate through the network. And the more computers and people
there are in the network, the more dominant the internet becomes.
Today, the internet is the most powerful digital infrastructure, for its reach,
relevance and capacity of wealth creation. It is the infrastructure which
allows the exchange of emails, the online commerce of goods and services,
the interaction with companies and governments, the access to news
and knowledge of all sorts, social interaction with friends and strangers,
among numerous other activities. Think about your life today: how many
things you do on the internet? What would happen if the internet were not
available for one month?
In Chapters 3, 4 and 5, we discuss the history of the internet and the
relevance of internet protocols in detail.
24
Chapter 2: Infrastructures: conceptual beginnings
Cloud computing
The idea of cloud computing is simple and logical if you understand
infrastructures. It is based in the concept of computing as a utility service, just
like electricity or water. When you buy or rent a house in most urbanised places
in the world, you take for granted that there will be an electricity provider to
supply the service to your house. You do not expect to be forced to generate your
own energy. Electricity has become a utility.
Let’s think now about how this idea of utility can be used for computing. The
key concept is the same: the final user does not want to be concerned to manage
their computing needs. Most parts of the services can be provided by suppliers
and delivered by the internet. These suppliers and their customers can reap
economies of scale.
A simple example: let’s say that five or more years ago Ann, a computer user,
wanted to use a particular software package to create documents (e.g. Microsoft
Word). In order to do this, Ann bought the software on a CD and a license to
use it and she installed the software on her computer. She needed to ensure
25
IS1181 Digital infrastructures for business
the software was updated regularly, going online to download the new
versions. Ann also knew that substantial changes in the product would
not be updated for free, new versions of the product would need to be
purchased again. Ann also wanted to be sure that her computer had a
backup of her documents. In order to do this, she had to buy a physical
backup disk for the computer and she needed to do this backup regularly
to avoid data loss.
In this example, the user needed to manage the updating of the software,
to accept that new versions of the software are not going to be for free, to
invest in a backup device and to take time regularly to do the backups.
Today we have a different way of achieving the same outcome with less
work. Now our user accesses the software package over the internet.
There is no need to load any software on the PC so no need for a CD.
The software is accessed from a browser over the internet, or via a small
app. Any updates to the software are immediately available as soon as
the update is done. The service provider can also do backups of the files
produced on its servers, in real time. Thus, the user does not need to
load software, keep it up-to-date or do the physical backup to be sure the
content is protected. The service provider may well ask a monthly fee for
these services, but they may even offer it at no cost.
A good example of such a service that you may be very familiar with is the
‘free’ email offered by Google (Gmail) and the ‘free’ word-processing and
file storage Google offers as Google Docs. Microsoft offers such services as
Microsoft365. These are both services based on cloud computing – that is
providing services, software and file storage via (on top of) the internet.
Cloud computing can be defined simply as the provision of computing
services through online networks. These services may be data storage,
software or just a platform on which to run your own programs. By
sharing resources among a large user base, cloud computing providers
promise a more professional and efficient computing service, which may
also be cheaper. Indeed, most people and organisations adopt cloud
computing because it is a cheaper and easier solution to their needs.
The concept of cloud computing is developed in more detail in Chapter 11
of this guide.
Mobile technology
Mobile technology does not need much introduction – it represents the
computer in your pocket, on your wrist or in your bag and perhaps also
in your car. Once upon a time, computers were only available as desktop
objects, in the same way as telephones, which depended on cables to
transmit information of any kind. Gradually this situation has changed,
for example with the development of light and portable laptops with
good batteries, mobile phones with data connections and, later, tablets
and a diversity of wearable computers (e.g. the Apple watch). Wireless
connections to allow such devices to connect to the internet (WiFi,
26
Chapter 2: Infrastructures: conceptual beginnings
Bluetooth etc.) Today mobile technologies are everywhere and the trend is
for their presence to become increasingly more pervasive.
An important step in this transition has been the development of
smartphones. There is indeed a huge change between the first generations
of mobile phones and the phone of today. In allowing access to the
internet in a very easy way, through touch screens, smartphone technology
has allowed the creation of an infinity of apps, which reinforce the value
of our smartphones. It is a virtuous cycle in which the hardware enables
the development of apps and related services and because of the diffusion
of apps and services there is a strong demand for better hardware.
The diffusion of mobile technology has brought other unexpected
benefits. If we go back in time, to the 1970s, 1980s and even 1990s, a
main concern for the economic development of poorer countries was
how to provide proper communication through telephone landlines. At
that time, people thought about the enormous amount of investment
needed to get the infrastructure prepared for widespread use of landline
telephones. When mobile technology was first developed, it was not clear
that such a revolution would come to the developing world very soon.
However, history shows that with mobile technology, even the benefits of
better communication have been grasped and once people experience the
benefit, they convince others and that demand develops strongly.
In 2021, the number of mobile subscriptions were 8.6 billion, more than
the world population (International Telecommunications Union, ITU).
Many people have more than one mobile, but this number shows that the
pervasiveness of mobile technology is extremely high. In similar research,
in 2014, ITU found that 95.5% of the world population is within the reach
of a cell tower to allow the use of a mobile phone. This is an amazing
achievement which has overcome all the obstacles of the previous landline
telephone technology. Indeed, the number of residences with fixed
landline is going down since its peak in 2006 (1,261 billion), reaching 855
million in 2020 (ITU). Many individuals and families do not need fixed
lines anymore, demonstrating the relevance of mobile technology as the
key communication channel and access to the internet.
Mobile devices are empowered by broadband services. Around the globe,
the number of active mobile internet users is 4.32 billion and the mobile
internet traffic share of total global online traffic is 56.89% (Statista). The
mobile broadband internet subscription rate is 83% in 2021, with a huge
gap between developed and developing countries (Statista). For instance,
in Europe and the Americas, the subscriptions represent 105% and 103%,
respectively, meanwhile in Africa the rate is of 41% only.
The next step in this process could be the development of ‘wearables’,
such as Google glasses and smart watches. The idea behind these devices
is better interaction with our physical world, either because we can have
more information available at any time, or because these devices can help
us to collect information, we would not be able to know otherwise. For
instance, how many steps have you walked today? Is this enough or do
you need to walk some more?
In Chapter 12, we return to the topic of mobile technology and discuss not
only the devices, but how they support innovation through new apps and
services.
Social media
Social media is a term used to classify a large diversity of digital services
which allow people and organisations to easily communicate and exchange
27
IS1181 Digital infrastructures for business
29
IS1181 Digital infrastructures for business
Apple iPod is a good example to start with. The iPod when it first arrived
on the market in the early 2000s was a piece of new technology, with a
strong value proposition: it allowed people to listen to their preferred
songs in a MP3 format. The first change then is in the product and the
way the product reaches the consumer. Instead of buying music CDs, to
be played in a CD player, the consumer would buy an electronic file to
be read by the iPod. The product changed from a material copy – the
CD – to an electronic copy. However, there is another difference: the iPod
allowed consumers to buy their songs through the iTunes service and only
the songs the consumer would like to buy. This was a huge innovation.
The traditional model for selling music used by record companies was
to bundle products together. For instance, you could by an album with
a collection of songs. The selection and bundling would be done by the
record company. The consumer could either buy all or not buy anything.
With iTunes, the consumer is empowered to choose exactly the songs they
like and they pay only for these songs.
The service has also changed: iTunes will keep a record of the songs you
have bought and it will restore the copies in case of loss. This would not
be possible when you bought CDs. A lost CD is a lost CD. This does not
happen with iTunes, Apple will keep track of the songs you have bought
in a cloud service. We can see here that Apple has created a new business
model. Traditional electronic companies would sell electronic devices
only. The recording companies would be responsible for making the CDs
available (or before, the vinyl discs). But Apple entered the space of record
companies and electronic gadget companies, unbundling the albums
and making individual songs directly available for purchase. This story
goes on, of course, other companies have entered this market with other
devices, other services and other ‘business models’. For example, almost
all mobile phones today can do most of what an iPod can do and iTunes
today is not the only player in streaming music provision – think of Spotify
or YouTube. The lesson here is that innovation is about change and digital
infrastructures promote change and then more change.
A second interesting example is Amazon’s Kindle reader. Traditionally,
books have been sold as paper objects. Amazon bet on an alternative view:
books may be long digital messages, to be read on electronic readers.
Some advantages: lower cost, no need for space at home for storing
books, capacity for carrying a large number of books in a small device and
capacity for recovering files in case of loss. Again, we have a combination
of a new product and a new service. Not surprisingly, some publishers and
bookstores have opposed this novelty, understanding that Amazon was
taking a slice of their business. Later, Amazon has taken an even a bolder
step in starting a self-publishing service. Through Amazon, you can publish
your own books without the approval or disapproval of a publisher.
Definitively, another new business model allowed for by the pervasiveness
of digital infrastructures.
A third example is Google Search. The value of the internet would be
reduced if people did not have the means to search for and find the content
they want. Google Search offers a solution to the problem: for free, people
can use Google Search to find the content they need. Mostly impressive, the
tool works with a high level of efficiency. The massive value that billions of
users get for free cannot be calculated. Google Search multiplies the value
of the internet and the world wide web. So, what is the catch? Some say
there is no free lunch, but is this disproved in this case?
As you probably know, Google make money selling advertisements,
promising to match the advertisement as close as possible to the interest
30
Chapter 2: Infrastructures: conceptual beginnings
of the person who is searching for something online. The business model
is quite simple: users like you and me get the benefit of free search,
but in doing our searches we give away data about our interests and
concerns. Google collects and uses this data to make money by selling
adverts targeted at the people who use their search engine. So, Google
knows that I was looking for a winter coat and I get lots of ‘coat adds’ for
a few weeks every time I go online. All three stakeholders, me, Google
and the coat advertisers win (we hope). Users like me are, however,
providing something to Google – we are ‘paying’ with the information
about ourselves. This allows Google to improve the algorithm of both their
search tool and the advertising services they sell. So far, all three parties
appear happy with this business model – we all use it!
31
IS1181 Digital infrastructures for business
32
Chapter 3: History of the internet
Chapter outline
This chapter presents an introduction to the internet, perhaps the most
important digital infrastructure in the world today. The chapter outlines
the history of the internet from its beginnings in universities and science
laboratories, its growth, first as way for scientists and academics to share
data and information and from the mid-1990s its explosive growth for
all manner of business, government and social uses. In the past 20+,
years the internet has become a universal resource at the centre of the
operations for all kinds of organisations, the lives of all kinds of people
and arguably the most effective driver of economic and social innovation
across the world.
3.1 Introduction
As you see in the paragraph above, it is easy to use the language of
superlatives when discussing the internet. It has grown in size, scope,
user base and technical performance at a fantastic rate and the speed
with which people around the world have become connected, even faster
in recent years via smartphones, is a stunning example of how rapidly
a technological innovation (a new idea and a new set of tools) can
disseminate across the world in both rich and poor countries. However,
in this chapter we will try to be a bit less excitable and set out some of
the history of the internet. In this history, we identify the key ideas that
underpin the internet as we see it today and in particular its character as
the quintessential digital infrastructure. In later chapters we discuss in
more detail some of the uses (applications) that are built on the internet –
such as the world wide web (WWW), cloud computing and social media.
In this chapter and the next we limit ourselves to the internet pure and
simple (well… not so simple).
34
Chapter 3: History of the internet
35
IS1181 Digital infrastructures for business
In this course and this guide, we do, however, recommend that, when
possible, you read about this history in the accounts written by the people
who were actually there at the time. In particular, Vinton Cerf, who was
a professor at Stanford University in California at the outset and a key
figure. He has written two short accounts of the origins of the internet –
one in 1995 and another (with a fellow pioneer, Robert Kahn) in 1998.
Both are referenced above in the Essential reading and you should read
both. You can also watch Vint Cerf in a video made in 2009 and cited
above.
36
Chapter 3: History of the internet
37
IS1181 Digital infrastructures for business
In Laudon and Laudon, Glossary at the end of the book, they define the
internet in even simpler terms as:
‘Global network of networks using universal standards to
connect millions of different networks.’
The key elements of these two candidate definitions can be teased out a
bit and include:
1. transmits digital data – it does just the one task of sending digital data
(e.g. anything coded in 0s and 1s)
2. from one place to another – data goes from point to point so we need
consistent ‘addresses’ for these places so the data can be transmitted
3. network of networks – it is made up of multiple different
communications facilities all linked together and adhering to some
minimum common standards
4. global reach – it is big and operates (almost) everywhere, e.g. via
smartphones, satellites etc.
5. shared and public – it is available to all (billions of users) who share
the network resources
6. fairly reliable – the policy of the internet is described as ‘best effort’
and we cannot rely 100% on it so we need some backup procedures,
security measures etc.
7. equal treatment of all data – once data is in transit your data gets
equal treatment to my data (but we discuss this issue more under the
theme of net neutrality in Chapter 16).
38
Chapter 3: History of the internet
This is a more formal definition – but essentially says the same things
e.g. the internet is a global system for communications and can serve all
manner of uses ‘layered on it’ as they say and reflecting a layered model
(see Chapter 6 for more discussion of layered models). This definition also
stresses the central importance of the common rules of operation that the
internet uses – known as protocols. Interestingly, it also shows us that
the people framing this definition 20+ years ago were fully aware that the
internet would continue to develop over time and so they use the phrase
‘…or its subsequent extensions/follow-ons…’ in their definition when
discussing the core protocols (TCP and IP).
The protocols they identified in 1995 as central are still central today.
These are Transmission Control Protocol (always called TCP) and the
internet Protocol (always called IP). These protocols are considered in
greater depth in Chapter 5, but for the moment we should understand
that:
• IP is concerned with the rules for addresses and for using them to get a
message ‘across’ the internet from its origin to its destination on a ‘best
effort’ basis.
• TCP is concerned with how messages are reliably delivered from a
source to a destination and what to do if a part of a message is lost
along the way (it does happen).
39
IS1181 Digital infrastructures for business
40
Chapter 3: History of the internet
42
Chapter 3: History of the internet
Notes
44
Chapter 4: Emergent design of the internet
Chapter outline
This chapter explains the most important features of the design of the
internet, in a basic level. The idea is to present how the internet transmits
data across Hosts. It explains in more detail the use of packet switching
for transmitting data, which gives the internet both the capacity of having
scalability (the volume of data transmission can vary substantially) and
resilience. The chapter also introduces the domain name system (DNS)
and the URL-style addresses (Universal Resource Locator), explaining how
content is found on the internet.
4.1 Introduction
The internet has been a phenomenal success as a digital infrastructure –
an infrastructure for everybody and for the whole world. So, the obvious
question to ask is ‘Why?’.
After all, as Zittrain (2009) explains in Chapter 2 of his book, there
were plenty of competitor projects and local or national networks under
development and many of these had more substantial financial and
commercial backing than the pioneers working on the internet. In this
chapter, we look at some of the key decisions that this team made about
how to structure and operate the internet and which we can argue led
to its success. We will argue that it was in large part these decisions that
laid the foundations for the internet’s ability to scale up to be a global
infrastructure serving the needs of billions of users and transmitting
unbelievable qualities of data.
In this chapter we focus on three specific technical decisions that emerged
in the early days and that have been proven over the years. In brief these
are to:
1. transmit data: do just this one thing and let all other things, any
intelligence or value adding activity, occur at the network fringes, e.g.
in the Hosts
2. use packet switching to optimise capacity and help build in scalability
and levels of resilience
3. design a flexible addressing system able to scale up from less than 10
hosts to millions (even billions) of Hosts.
4.2.1 Do one thing well – leave other things for other people
At the outset in the 1980s computer scientists such as Vinton Cerf were
working hard to link together (inter-connect) big mainframe computers
located in universities and research centres. These machines were built
by different manufacturers, did diverse kinds of work and to link them
together would need some kind of general purpose and adaptable solution
that could incorporate more computers and more variety in their design
and what they were used for – not one optimised to the specific needs of
the moment. It was the case then (even more than today perhaps?), that
computers were developing very rapidly, so in five years’ time they knew
that there would be different machines doing different jobs, but they
should still be able to use the intercommunication system.
The approach taken, given this context, was to develop a general-purpose
data communications capability, but to isolate it from any specific machine
by using a network access device called an IMP (Interface Message
Processor; read Cerf, 1995). The IMP developed at the time was a small
computer in its own right that could ‘hide’ any computer and its specific
details from the network and the network from the computer. To add a
different or new computer to the network the only work needed would be
to reprogram the IMP.
In terms of Figure 3.1 the IMP was placed between a host and the link to a
node of the network. It isolated the one from the other and allowed both
‘sides’ to develop and change without affecting each other. Indeed, the IMP
from the 1970s has evolved to be the IP.
46
Chapter 4: Emergent design of the internet
One way to express this is to say that the internet was (and still is) a
deliberately ‘dumb’ network. It needs to know almost nothing about who
sends or receives data – only the bit string that is the message and the
addresses of sender and receiver. The internet does not care what the data
represents – it was and still is just a string of bits – and it undertakes to
do nothing clever with the data while it is in transit. Also, it did not (and
still does not) keep any kind of detailed billing data to count bits and send
out bills (unlike your mobile phone network!). Today the service providers
manage the access to the internet, billing final users (individuals,
companies, governments, etc.). Remember though that at the outset in the
1970s and 80s the internet was subsidised by the US government and so
did not need to account for specific usage in financial terms.
The genius of the pioneers was to recognise that building a dumb network
was easier than a smart or busy-body network and (more importantly)
helped to make a network architecture that could scale up (e.g. from four
Hosts to millions or billions). This has also meant that any intelligence or
extra features has always had to be added on the outside – that is in the
Hosts not in the network. This decision has proved very powerful as a way
to drive innovation based on using the internet. A person with a good
idea – let’s say a streaming service for films with real time AI-based audio
subtitling in any one of 300 languages (note this is a made-up example) –
can program their own computers (Hosts) to do the clever stuff and let the
‘dumb’ internet carry the service to their customers across the world. The
network can accept this innovative service just as it can accept thousands
of others.
47
IS1181 Digital infrastructures for business
When Tony sends this file, he should not expect that these 1,000 packets
to all travel along the same route, arrive in the order sent, or even arrive
at all. But do not worry, between them TCP and IP – the core internet
protocols – will sort this out: what we call the ‘reassembly’ of the original
stream of bits from the many packets arriving at the destination.
You might very well ask, why go to the bother of slicing up a message into
packets and sending them independently through the network? It perhaps
does not sound very efficient or reliable. In the early days the developers
of the internet were in a minority in choosing this approach and many
thought it inappropriate. The alternative was a circuit switched
network, as used in older data networks and in the original telephone
systems. In a circuit switched network the first task is to establish a circuit
from one end to the other (e.g. dial a number and wait for the telephone
exchange to go click-click-click as it sets up a solid copper wire connection
from caller to receiver). Remember, up to the 1950s telephone exchanges
were huge electro-mechanical devices that used physical switches to set up
a line and make a call possible. Once that connection is made, the data (a
conversation) can flow, but not before.
However, using packet switching for digital networks is now almost
universally adopted. Put simply, if a network is used efficiently as a shared
resource (a core characteristic of an infrastructure), the primary concern
is with the best use of the overall system’s capacity to move data. By
breaking messages down into packets each node in the network, and each
link between nodes, can be kept busy handling packets without needing
to bother that these packets are part of the same message – they are just
packets of data to be sent on their way. Keeping each link busy (e.g. high
utilisation) equates to efficient use of the network. This is sometimes
explained in terms of these networks being designed for ‘bursty’ traffic
– that is streams of data that include bursts of intense activity and then
periods of little or no data to transmit (silence). In circuit-switched
networks, resources (e.g. links) are held for just one message to use. But
with packet-switching resources (e.g. links) do not need to be held for
periods of silence.
The technical term for this sharing of a link by different and distinct
streams of data is ‘multiplexing’, sometimes called ‘muxing’. It can be
defined as sending multiple streams of data over a communications link at
the same time in the form of a single, complex signal. At the receiving end
the separate streams of data are recovered (separated out). This process
is called demultiplexing or demuxing. As a simple analogy, a post office
truck full of letters and parcels driving up the highway from London to
Edinburgh is a multiplexed link and the sorting office in Edinburgh will do
the demuxing.
49
IS1181 Digital infrastructures for business
local
Mail client cache
local
cache
DNS Resolver
recursive
Web Browser DNS Resolver DNS
cache timeout: mini search
1.30 min cache Operating System Your ISP
Client Programs
Your Computer
51
IS1181 Digital infrastructures for business
Notes
52
Chapter 5: The internet today and the TCP/IP
5.1 Introduction
This chapter is concerned with how the internet main protocols work and
the data structures they use (e.g. packets in IP and data segments in TCP).
You can think of each protocol as a set of rules of behaviours for devices
connected to and working as part of the internet. As in earlier chapters, the
aim here is for you to understand the jobs that these protocols do and the
principles that lie behind their design. We are not too concerned with the
finer technical details. Then, of course, computers (Hosts, Nodes Routers
etc.) need to be programmed to obey these rules and that can raise many
technical concerns – but here we are trying to understand the principles and
understand how messages pass across the internet.
55
}
IS1181 Digital infrastructures for business
Options word 6
56
Chapter 5: The internet today and the TCP/IP
Figure 5.3: Screen shot of the Windows tracert program finding the route and
hops to get from my computer to www.london.ac.uk
The screenshot above shows that the International Programmes website has
IP address 151.101.130.216. It also shows that the nice human address we
all use and can remember: http://www.london.ac.uk/ is just a proxy for
a rather more complicated URL address of 3i2pw67lodcps.edge.platform.
sh. The tracert screen shows all the hops across the network from node to
node that a packet makes to get from me at home using my ISP connection
to this website – the first line is the hop from my computer to my router
(dsldevice) at home (192.168.1.1). Note that all the later nodes shown have
a .net domain – until we arrive at the final .ac.uk Host.
57
IS1181 Digital infrastructures for business
packets take a different route because each node along the way will make its own best
decision as to the right route depending on the conditions on the day and anyway the
network and the services on it are always being changed and adjusted.
58
Chapter 5: The internet today and the TCP/IP
59
IS1181 Digital infrastructures for business
way across the network. It is generally best if the segment goes in one
IP packet – e.g. we can set TCP to make small enough segments to fit in
one IP packet.
3. The IP packet header will contain the Protocol code that says that this
packet contains data related to a TCP connection. So, when it arrives at
the destination Host, the data (TCP segment) will be handed from the
IP layer to TCP.
4. TCP layer at the receiving Host will acknowledge the arrival of
the data by sending back to the sending Host a TCP segment (of course
using IP) that is an acknowledgement of data received up to the byte
number given in the Sequence Number field. This acknowledgement
message can also set the ‘window size,’ e.g. the number of bytes the
receiver is prepared to handle at one time. In this way the receiving
Host can indicate that ‘I am busy and need less data sent at a time,’ or ‘I
am happy to receive more data’, or even ‘Stop sending me data’.
5. The TCP layer at the receiving host will reassemble the original message
(in our case a Word file) out of the contents of the many segments it
receives, each with a sequence number and then direct the data to the
program designated in the ‘destination port’ field.
TCP segment
Data
Reserve Word 4
offset Window size (16 bits)
dwr
psh
ack
ece
urg
syn
fin
rst
ns
(3 bits)
(4 bits)
61
IS1181 Digital infrastructures for business
of the next byte of data expected). This is sent back to the sender and
acknowledges receipt of all bytes of data up to this one.
Data offset: This is the size of the header in 32-bit words. Minimum 5,
maximum 15, e.g. it tells the TCP receiver how many words to skip to find
the payload data.
Option flags: The flags in Word 3 have many uses. So far, we have
spoken of SYN and ACK and below we mention URG. The others we do
not consider.
Window size: This specifies the number of bytes of data that the receiver
is willing to receive (e.g. for flow control). It might be as low as 0 which
means stop sending.
Checksum: A checksum for error checking in the received segment.
Urgent pointer: If URG flag is set this is an offset from the sequence
number indicating the last urgent data byte.
Options (if data offset >5): This option allows the TCP segment
to carry more information in the header for purposes such as setting
maximum segment size, agreeing acknowledgement rules. Remember, the
internet was set up to be capable of being developed and extended and
this is an example of how new features might be tried out in TCP without
preventing the previous rules still being perfectly workable. Achieving
this kind of flexibility is one way to allow backward compatibility
e.g. making experiments, developments and improvements in a way that
still allows older systems or ways of working to continue to operate. It is
fundamental to all infrastructures and in particular digital infrastructures,
that they evolve and develop over time and this makes being able to
support backward compatibility very important.
62
Chapter 5: The internet today and the TCP/IP
to send less data (even no more data) before stopping and waiting for
an acknowledgement.
The Wikipedia page on TCP https://en.wikipedia.org/wiki/Transmission_
Control_Protocol also lists a number of vulnerabilities of TCP – features
that may make it possible to attack or interrupt TCP traffic. This is not a
reason not to use TCP, but perhaps to use it with other security features
and security protocols that then sit on top of TCP. For example, when
you use a secure link in a web browser, e.g. the URL address shows as
HTTPS:// and says ‘Secure’ in your browser, another layer of protocol on
top of TCP is working to encrypt the web page data before it is divided
into segments by TCP.
Source port (16 bits) optional Destination port (16 bits) Word 1
As you may expect this is a very efficient way to send small or urgent data
if you do not need flow control or reliable transmission. For example, this
might be the case for streaming video across the internet. If it is ‘real time’
as in a Skype or FaceTime call, using UDP may help to ensure a faster link
and a better user experience even if the video or audio quality is at times
a bit rough. Much voice and video traffic on the internet uses UDP for this
reason.
UDP also suits simple small message exchanges. For example, the DNS
system discussed in Chapter 4 uses UDP rather than TCP. Efficiency is
probably the main reason, given the billions of DNS calls that are made
every minute of the day, but which just consist of a simple URL sent and an
IP address returned – in both cases around 10–20 bytes of data in total.
Once again, this choice and the ability to make your own trade-off
between efficiency, timeliness and reliability, are examples of the
generative capability that has been nurtured in the internet world. This is
a network that offers a bundle of features but lets the user to decide how
or when to use them.
63
IS1181 Digital infrastructures for business
64
Chapter 6: Using a layered model of infrastructure: ‘above and below’
Chapter outline
This chapter presents the layered model of infrastructure, sometimes also
known as the ‘hourglass architecture’.
This is a general way to understand how pieces of technology are
combined together, each doing a specific task, so as to allow the creation
(or emergence) of the digital infrastructures that people use. The chapter
draws upon the work of Jonathan Zittrain, presented in the book The
future of the internet – and how to stop it (2009). In this book, Zittrain
focuses first on the internet and the way layers are combined to create
the internet and its related services. Zittrain’s argument leads on to the
concept of the internet as a source of innovation, which he presents using
the concept of generativity.
We try to provide as simple as possible an introduction to these ideas,
summarising Zittrain’s ideas to facilitate your understanding at an
introductory level. When you have grasped the basic ideas set out in this
chapter you will be ready to move on to the fuller arguments presented in
Zittrain’s book.
6.1 Introduction
This chapter introduces a general layered model of digital infrastructures.
A ‘model’ in the way we use the word here is a way of framing our view
of the world and helping us make better sense of it. As we all know,
the world is a very complex and messy place. Humans feel better when
they put some order on the world, through classifying and framing the
phenomena they observe and developing rational accounts to explain facts
and events. This kind of modelling is the basis of most science, but also
social sciences such as management, economics, or sociology. If and when
we can test a model against the world, we can then generalise it further to
become a ‘theory’. In this chapter, however, we stay at the level of a model
to help us better to cope with the complexity of our subject of digital
infrastructures.
In this chapter, we present first the layered model of an infrastructure.
Then, using this model, we present the idea of generativity.
We start by presenting Zittrain’s perspective on the layered model
(his hourglass architecture), as he applies it to the internet, but here
we want to be a bit more general and talk about all manner of digital
infrastructures. We then turn to consider how the flexibility of the many
parts enables innovation. In particular, we connect the discussion of the
layered model with the concept of generativity, exploring Zittrain’s
framework that identifies the characteristics of a digital infrastructure
that make it more prone to foster innovation. At this point, we resume the
discussion on the concept of innovation, which is a fundamental aspect
of the discussion in later chapters (as introduced in Chapter 2).
You already have seen a simple introduction to the layered perspective at
the end of Chapter 2, when we show how different pieces of technology
– the internet, the WWW, cloud computing, mobile technologies and
social media – are related to each other and in Chapter 5. In this chapter,
65
IS1181 Digital infrastructures for business
66
Chapter 6: Using a layered model of infrastructure: ‘above and below’
own timescales as long as the interface between the layers is not changed.
In Chapter 2 we considered a very simple example of an infrastructure
interface when we spoke of the standardisation of the electrical plug and
socket and the voltage of electricity supplied. This allows you to plug
in all manner of different devices to the same electricity infrastructure
in your home. You can move from a fan heater to a vacuum cleaner to
an air conditioner to a radio and the infrastructure does not need to
know or change as long as you use the same plug and work on the same
voltage. Interfaces and standards are then used where different parts of an
infrastructure ‘plug’ together.
The simplest layered model for any digital infrastructure has three layers
as introduced in Chapter 5 for the case of the internet. At the bottom, we
have the physical layer, in the middle the protocol layer and at the top the
application layer. To do useful work we need all three layers to be present
and working (Figure 6.1). The principle of layers is used here at a quite
simple level – just three layers. Later on, we will use similar models, but
with more detail and more layers. For now, we keep it simple. Laudon and
Laudon (2021) show a layered version of the TCP/IP as we discussed in
Chapter 5 above.
We now consider each layer of our simple model on its own, from the top,
then the bottom, then the middle.
Applications
Protocol
Physical
Figure 6.1: Basic three-layered model for a digital infrastructure.
The physical layer is all the cables and wireless transmitters, the
servers and the devices which allow communications to take place.
These are the hardware aspects of an infrastructure and for any kind
of digital communication to occur (other than mindreading) you need
some equipment so that bit-strings are transmitted and received. The
physical layer does not know of or interfere in the sort of communication
taking place or care about the content and it may include many kinds
of transmission technologies suitable for transmission in different
circumstances.
fast high-capacity fibre optic cable between London and New York is of
no use to anybody on its own. It needs users with uses in mind. This is
neatly expressed in the writing of the US author Henry Thoreau who in
1854 wrote the following about technology in general and information
infrastructure in particular:
Our inventions are wont to be pretty toys, which distract our
attention from serious things. They are but improved means
to an unimproved end… We are in great haste to construct a
magnetic telegraph from Maine to Texas; but Maine and Texas,
it may be, have nothing important to communicate. (Henry
David Thoreau, in Walden, 1854, Chapter 1.)
Girlfriend in Buenos Aires - using Skype Boyfriend in Cape Town - using Skype
Applications Applications
Protocol Protocol
Network
Physical Physical
69
IS1181 Digital infrastructures for business
70
Chapter 6: Using a layered model of infrastructure: ‘above and below’
Layer Elements
71
IS1181 Digital infrastructures for business
72
Chapter 6: Using a layered model of infrastructure: ‘above and below’
73
IS1181 Digital infrastructures for business
the innovation process, but also reduces the risk for the entrepreneur, who
will pay for the software and the servers in the cloud only if and when the
company has sold the product.
Similar generative patterns can be seeing on social media. Again, social
media services are successful because they operated on the top of the
internet. They become themselves digital infrastructures when offer space
for further innovation on the top of their own layer. For instance, Facebook
has made its API public, allowing developers to design apps to work
within Facebook. Zynga has become a massive player in the production
of games through developing apps that run on Facebook, exploiting its
social network effects. When Facebook makes its API public, it becomes a
digital platform, allowing other apps to be developed on the top of its own
infrastructure (see more details on digital platforms in Chapter 17).
Mobile technologies repeat the same pattern. First, as discussed in
Chapter 2, the key factor for the mobile phones to become so pervasive
is the capacity of using them for accessing the internet and data. There
is thus a symbiotic interaction between the internet and the mobile
devices, in which one leverages the position of the other. In addition,
mobile technologies have become themselves digital infrastructures
with generative patterns. Let’s again think about the APIs of the iPhone
and Android devices. As the APIs are available, developers around the
world have created millions of apps to mobile devices, innovating in the
way services are provided in all areas, from games and entertainment to
education and healthcare.
These three examples show the relevance of the layered model, hourglass
architecture and the concept of generativity for a better understanding
of the nature of digital infrastructures as channels for innovation. In
later chapters we come back to these concepts, to discuss in more depth
these key digital infrastructures. Let’s now discuss two other examples
of solutions created on the top of these digital infrastructures, to better
embed our knowledge on their generative power of the hourglass
architecture of digital infrastructures.
The first example is about delivery services, which can be contracted
by individuals or companies, as per their demand. For instance, you are
at home on Saturday evening with friends, buy your pizzas online and
contract Uber Eats or Deliveroo or your local delivery service to deliver the
pizzas. The app for delivery operates on the top of the mobile operating
system, using the API of Android and iOS, for instance. The app also uses
the power of cloud computing, as all exchange of information between
the users and service providers happens in the cloud. The delivery
companies have incentives to use cloud services, as they have irregular
flow of data in their systems, depending on the demand at any given time.
The cloud services (such as Amazon Web Services) allow the company
to expand their use of servers when necessary. This has happened during
the Covid-19 lockdowns, when many individuals and families used the
delivery services to buy food from restaurants which were operating only
with takeaways and delivery. Indeed, many restaurants have changed
their operating model during the Covid-19 pandemic, moving from
serving food inside to providing takeaway food. These restaurants have
quickly innovated their business models joining platforms for delivery. The
innovation from the restaurant’s perspective was easy and fast, because
the digital infrastructures and the digital platforms for delivery were
already there, ready for absorbing as many new restaurants as required.
The second example is also about the response to the Covid-19 pandemic.
Governments around the world have created, through their health
74
Chapter 6: Using a layered model of infrastructure: ‘above and below’
75
IS1181 Digital infrastructures for business
Notes
76
Chapter 7: Core ideas for evolving infrastructures I: installed base and cultivation
Chapter outline
This chapter explores theoretical concepts to help understand how digital
infrastructures evolve. The chapter makes a strong claim that it is difficult
if not impossible to ‘design’ digital infrastructures. Rather, that (successful)
digital infrastructures evolve over time and in unexpected ways, generally
starting their development by drawing upon other infrastructures.
Through time, layers are refined, adapted and perhaps added moving
towards a digital infrastructure that is generative – that is self-powering.
To explore these ideas, the chapter uses the two concepts of installed
base and cultivation, drawing upon examples from the internet and
other digital technologies.
7.1 Introduction
In Chapter 6, we discussed the characteristics of digital infrastructures,
using the layered model and hourglass architecture. This perspective is
useful to understand the current state of art of these digital infrastructures.
However, we have not yet discussed how powerful digital infrastructures
are created. This chapter and the next focus on understanding how digital
infrastructures are developed, providing some theoretical concepts to be
used later when we analyse other infrastructures.
In this chapter, we present two key concepts: installed base and
cultivation. First, we need to understand that key digital infrastructures
evolve through time. Despite our best efforts to design an infrastructure,
the fact is that things are going to change in directions we have never
thought. Thus, we always need to leave room to accommodate the
new developments while making the best use of an installed base.
Second, as digital infrastructures are not designed from scratch, we
need to understand their process of development, which may be more
about accommodating change in face of the innovation, a process which
has been called cultivation by scholars. Lastly, we introduce the idea
that institutions influence and are influenced by digital infrastructures,
pointing out that digital infrastructures affect human behaviour, a topic to
be discussed further in Chapter 9.
77
IS1181 Digital infrastructures for business
79
IS1181 Digital infrastructures for business
This short history of innovation, growth and change shows that the digital
infrastructures we know it today has not been designed. Rather, it has
emerged from the original system, which already was built relying on
relied on other earlier infrastructures (such as the telephone). And there
is more to come we can be certain. Our digital infrastructures will keep
on evolving in unforeseen ways. Thus, the concept of design in a holistic
sense is not that useful for us as we try to understand the emergence of
digital infrastructure. We need a different framework, as discussed below.
80
Chapter 7: Core ideas for evolving infrastructures I: installed base and cultivation
own standards, with its own applications, which are supported by different
stakeholders with different interests in that particular piece of technology.
The larger the number of stakeholders, holding different interests, the
more complex the negotiation for change, especially if it is necessary to
obtain an agreement among social actors who hold contradictory interests.
For this reason, the ideal model for large digital infrastructures is the one
based on maximum flexibility on how parts are to be developed and used,
fostering the interoperability through the use of standards which regulate
the forms of interactions and communication among the parts. The ‘tight
waist’ of the hourglass, with its limited and stable protocols also allows for
a good insulation of innovation and change above from innovation and
change below.
Ciborra (2004) particularly discusses these aspects of digital
infrastructures, proposing alternative approaches for managing the
phenomenon of complexity. Ciborra proposes to accept the characteristics
of digital infrastructures and adopt strategies such as constructing
gateways and adapters (as the internet pioneers did with their IMP
device; see Chapter 3). The information flow is then driven through these
gateways and adapters. In this fashion, each part of a large network would
be allowed to evolve in its on terms and gateways would connect these
heterogeneous parts in order to form a bigger network which is functional,
in spite of the differences of the parts. Again, internet features such as the
backbone and the DNS serve this kind of strategy.
Through gateways, it is possible to connect and guarantee the
interoperability of all parts, even those which are very peripheral to
the system as a whole. This process makes possible the inclusion of less
relevant or well-resourced parts in a network, thus providing for those
small groups which may require something very specific for their needs. It
also increases the flexibility of the whole network, as new modules can be
added to the main system without affecting directly all the other modules.
Again, we see here an opportunity for innovation. Indeed, as the user
base grows and diversifies, we can expect to observe more of the network
effects: with users’ needs and their desired use influencing in the way the
digital infrastructure evolves.
This approach helps to shape a better interaction with the installed base.
First, it recognises that there is a diverse installed base of a myriad of
technologies and that new developments need to both build on of this
and reshape it. It recognises that it is almost impossible to substitute
an installed base, either for reasons of costs or for political reasons (the
different perspectives of stakeholders). In other words, in recognising
that there is an installed base which is not going to change easily, we then
accept that that each part of a digital infrastructure will evolve to some
degree in its own way or at its own speed and the focus of professionals
and users should largely be in creating gateways and adapters for the
infrastructure to better work together as a whole. Easier said than done.
Ciborra argues, unsurprisingly, that the internet is a good example of
how a digital infrastructure grows through involving many different
stakeholders and pieces of technology. He suggests that the internet has
evolved out of the perspectives of two strong groups. On the one hand
the military people, looking for a resilient communication network which
could survive a massive attack from an enemy and on the other hand the
academic community, which would look for a technology which would
favour decentralisation and open exchange of data. TCP/IP appears
as a good solution to bring together the property of resilience and a
decentralised network, although both key stakeholders would continue
81
IS1181 Digital infrastructures for business
have very different ideas on the desired outcome and uses of this design.
Indeed, TCP/IP has allowed different networks to come together as a
unique digital infrastructure, by providing the gateways through which
inter- communication is possible and thereby gained the momentum
necessary to allow the quick growth of the user base and the innovation and
evolution of the installed base.
83
IS1181 Digital infrastructures for business
85
IS1181 Digital infrastructures for business
Notes
86
Chapter 8: Core ideas for evolving infrastructures II: standards and network externalities
Chapter outline
This chapter keeps the focus on core ideas for allowing infrastructures to
evolve. The focus is on the role of standards, both formal and informal.
Digital infrastructures become key technologies that can scale across the
world and support multiple uses based on their use of clear standards
for exchanging data and information and sharing access to services. How
standards are established and used is fundamental to understanding how
digital infrastructures evolve. In this chapter we see that standards both
enable and constrain the way a digital infrastructure is used and evolves.
The chapter then goes on to explain the idea of network externalities, which
is related to the size of networks and the related challenge of lock-in.
8.1 Introduction
In Chapter 7, we argued that digital infrastructures are difficult or even
impossible to design from scratch. We also argued that the way to develop
or evolve a digital infrastructure is through exploiting the installed base
and by using gateways and adapters add functionality. In this chapter
we say more about how standards for interfaces and protocols perform
this role and allow the different parts (layers, elements in a layer) of a
digital infrastructure to interact and communicate with others. Through
common standards, layers and elements of them can evolve independently
of each other while still keeping the infrastructure working together as a
whole. Enabled by standards, digital infrastructures can grow and gain
momentum to become key players in economies and societies.
88
Chapter 8: Core ideas for evolving infrastructures II: standards and network externalities
Standards are everywhere in our lives. When you buy a kilo of sugar you
have a particular expectation about what is meant by the word kilo. When
you buy a car, you have a particular expectation in terms of how much this
car is going to pollute the environment or how safe it is in a crash. When
you board an airplane, you have a particular expectation about the size of
the bag you can have under your seat or fit in the lockers. Standards thus
facilitate our exchanges and interactions in society, shortcutting the need of
further negotiation at any new exchange or interaction.
Standards represent some aspect of the chosen communication pattern
of a particular digital infrastructure. This is achieved in accordance
with a complex negotiation process in which the social actors involved
(professionals, associations, organisations, governmental and regulatory
bodies etc.) come to a consensus which is going to benefit all. In other words:
all social actors involved in the definition of a standard for a particular
aspect of a digital infrastructure have an interest in the digital infrastructure
working well. This is the starting point of the negotiation. Naturally, as we
have seen in the previous chapters, this conversation may not start from
scratch: the established standards of the installed base may affect and limit
the choices social actors have to propose new or revised standards.
Earlier in this subject guide, we discussed core standards in the
protocol layer, the internet protocol which defines how data packages
are routed across the internet. This standard protocol makes possible
the communication across the network. Any node transmitting and/or
receiving information on the internet benefit from IP as a standardised
way of communicating. You buy a computer, you open the browser and
immediately you have access to the internet and the WWW because your
software adheres to standards such as IP or HTTP, doing it the same way
as billions of other people. This strong adherence to a common standard
means that the network you use is shared with billions of other people,
which increase the value of it to you.
Let’s consider another example, of an area in which standards are not
working so well. Think about your mobile phone charger and how many
you have had in the past few years. Each mobile manufacturer decides
which standard they are going to use for their own charger. They even have
different chargers for different devices. If you need to charge your mobile,
you need to have a charger which is specific for your device (voltage, plug
etc.). It would be easier for most of us if all small chargeable devices could
be charged with a standardised charger. We are certainly not there yet. In
this case, the industry players have not reached an agreement – indeed
it may not be in their interests to do so and users like you and I have not
exercised enough pressure to get full standardisation, which could benefit
us all. Note that in this case there is a wider environmental benefit that may
arise from standardisation in reducing the number of chargers produced
and the number thrown away.
89
IS1181 Digital infrastructures for business
that they develop and use in their products or services, but which they
carefully control and limit access to. On other occasions they may make
a standard relatively open and freely share it on the grounds that this
helps everybody. Even open standards have diverse levels of openness. For
instance, a standard embodied in open-source software allows the code
that expresses the standard to be seen, used and amended. TCP/IP is an
open standard, available to all to use, which is owned and managed by a
collective body (the IETF).
The APIs of private companies who offer online services and platforms
(e.g. Google, Facebook, Amazon, Dropbox etc.) are an important kind of
closed standard. User companies and individuals have access to the API
and can develop apps to run on these platforms and use their services.
However, the platform owner has the ability to define the rules of use of
the API and thus the platform. When announcing the launch of the App
Store, Steve Jobs, the founder of Apple, set quite tight rules for creating
apps on the platform, with some content and functionality being excluded.
In this way, the Apple platform retained the right of curating the content
which is available in their virtual space and can take a cut of revenues
generated by these apps.
90
Chapter 8: Core ideas for evolving infrastructures II: standards and network externalities
who defend the Net Neutrality argue that the benefit of having free and
equal access to information is more important and that the constraint of
not allowing ISPs and other players to get a bigger share of the wealth
generated by the internet must be maintained. In order words, the current
Net Neutrality standard is the one which offers a more beneficial and fairer
distribution of value across the whole network, not discriminating between
big and small users.
The example of Net Neutrality shows that the choice of a particular
standard is not neutral, based only on the best technical solution (see
more in Hanseth and Monteiro, 1997). Any sort of standard for digital
infrastructures – even if just an agreement on how things should work – is
defined in a political environment, in which social actors try to get the best
from their own perspectives, limited by the characteristics of the technology
and their own ability to influence outcomes. In other words, standards
embed defined patterns of use, which have a level of flexibility for sure, but
which also imply limitations. The way a particular standard evolves through
time also depends on the way social actors negotiate and align their wider
interests.
For key digital infrastructures – such as the ones discussed in the following
chapters of this subject guide – the process of standardisation happens at
an international level, involving companies, governments, international
standardisation bodies and professional associations, interest groups and
international institutions. Again, we see that the emergence of standards is
not solely a rational design process; rather, it is a political, social process,
which tries to get a number of social actors to align their interests around
a particular piece of technology or way of doing things. This also shows
that the final decision on a standard is only one possibility among many.
It could be otherwise. However, once a particular standard is chosen and
individuals, companies and institutions start using it, it becomes more
and more difficult to change anything in that standard – it becomes
the constraining installed base. And so we go back to the idea of path
dependency, which we discussed in Chapter 7.
91
IS1181 Digital infrastructures for business
and time consuming and would require the platform to develop the
communication links with the new add-ons. API also allows third-party
apps to talk to each other too, as far as they use the API of the platform
to exchange information. This adds another layer of potential innovation,
not only for apps to operate ‘on the top’ of a platform but also for apps to
collaborate with each other ‘via’ the platform.
In technical terms, an API is a standardised interface defined (specified) by
the provider of the requested service or services (e.g. a software module
or cloud SaaS provider). The API is published – made known to others
who may wish to use it – and says as it were ‘This is what I can do for
you…if you give me the right data’ (not so dissimilar to what a protocol
such as IP offers). Of course, the requestor of a service needs to know the
specification of the API, so as to access the API in an appropriate way and
with appropriate data. The requestor says, as it were ‘I understand that
you can do these things, … I would now like you to do this particular one
… and here is the data you need’.
Wikipedia describes an API a bit more formally as follows:
‘An application programming interface connects computers or
pieces of software to each other. It is not intended to be used
directly by a person (the end user) other than a computer
programmer who is incorporating it into software. An API is
often made up of different parts which act as tools or services
that are available to the programmer. ‘ https://en.wikipedia.
org/wiki/API
In the last sentence of this definition a useful distinction is made between
a bundle of interfaces that perform related work – the usual use of the
term API – and the narrower focus on one individual service (sometimes
called an ‘end point’). Thus, the Dropbox API is a bundle of specific
interfaces that the cloud storage provider has developed to allow its
clients (other companies/users/apps/programs) to write their own code to
create files, read files, delete fines, make folders and so on, each of these
being individual services within the overall Dropbox API. To get a better
understanding look at the public Dropbox API description (specification)
at https://www.dropbox.com/developers/documentation/http/overview.
Note that you are not expected to know any of the specific detail – just get
the broad idea.
The Wikipedia entry goes on to note that:
‘One purpose of APIs is to hide the internal details of how a
system works, exposing only those parts a programmer will find
useful and keeping them consistent even if the internal details
later change.’
This aspect of APIs is compatible with the layered model and the wider
role of interface standards supporting ideas of cultivation and generativity.
The internet and WWW function by using many protocols and you could
say, APIs (standard interfaces). As we have seen, these help to isolate the
detail of specific functions or services (end-points) and thereby allow the
detail of how things are done to be changed (improved we hope) without
undue consequence elsewhere (again, we hope).
The layered model of a digital infrastructure implies that between layers
there will always be some kind of an interface – for example when TCP
passes an outgoing packet to IP it does so ‘software to software’ and we
might say that it ‘uses the IP module API’. Some of the detail of this API
is expressed in the packet format we discussed in Chapter 5. Similarly, at
92
Chapter 8: Core ideas for evolving infrastructures II: standards and network externalities
the receiving host, the IP module will pass the data ‘up’ to the TCP module
using what we might call ‘the TCP API’. Similarly, in the WWW HTTP
provides an API for any web server software to use including the GET(xxx)
command to ask for data from a server and the PUT(xxx) command to
send data to a server. Still, it is probably better to talk about the internet
and WWW in terms of standardised protocols and reserve the term API for
higher level Application layer services.
93
IS1181 Digital infrastructures for business
All the services listed can be accessed via the API of other firms offering
relevant services. In London it might be Uber (taxi), Opentable (booking),
Opayo (credit card payments), Deliveroo (delivery), Google maps (driving
and public transport), JobDiva (recruitment). In your own hometown
there will certainly be a different set of possibilities – but the same
principle will apply. To use each of these services you will probably need to
register as a user and usually pay to use the service in some way or other –
though some may be ‘free’ as in you pay with your data.
Even a small business may need to use tens or even hundreds of APIs to
access needed service. The restaurant chain described above will have
more needs for digital services and hence more APIs to use. For example,
in their supply chain of food and other goods needed to run a restaurant,
to run a payroll, to keep accounts, recruit staff etc. There is also a
specialised set of service providers that sell API management services to
big corporations to help them develop API for their services and keep track
of all their connections online.
A new phrase, the API economy, has emerged to register the
importance of APIs for digital businesses and their economic function
in driving revenue for service suppliers and innovators. SaaS providers,
for example Adobe, Microsoft, Salesforce, Dropbox or Zoom, have
products and services that are fundamentally based on their valuable API
that connect them to their customers and drive their revenue. Another
important part of the API economy are intermediaries who ‘match’
transactions between two or more parties. For example, a taxi company
like Uber that matches drivers with passengers via apps on mobile devices
of passengers and of drivers. Indeed, all manner of Digital Business
Platforms (see Chapter 17) are manifestations of the API economy.
increase the value of using the platform for all members. Network effects
can be negative too. More cars on the road equal more congestion and
pollution – a negative network effect. A common negative network
externality for digital infrastructures is seen when cyber criminals choose
to focus on the largest social media networks. The problems of ‘fake
news’ can also be explained in part as a negative network externality.
Network effects, in particular positive network externalities, are often
used to explain why successful digital infrastructures grow very large. The
argument is that size (number of members, nodes) matters and people
recognise that belonging to or using a bigger network delivers more value
to them. Better to be on Facebook (around 3 billion users in late 2021)
than a smaller local social media platform. The argument applies to the
internet too. The internet has become a massive and dominant digital
infrastructure because it has been successful in attracting a large variety of
users and uses – where ‘uses’ indicated scope. The size is explained by the
value that people and services gain from being part of a big network. Note
also that this would not have happened if the internet has not defined
clear standards that could adapt to all kinds of different circumstances and
uses. And the more people, organisations, services and devices that use the
internet, the more benefits the network brings to each connected host.
We also need to be careful not to confuse economies of scale with positive
network externalities. Economies of scale are about the actual costs to
doing the business and there may well be some such economies in a large
digital infrastructure versus a smaller one. Externalities, in contrast, are
about the value (positive or negative) that participants experience. In
economic terms the two can be seen as two parallel concepts: economies
of scale operating on the supply side and externalities on the demand side.
This concept says that the more social actors that use a particular network,
the greater the benefits for all actors in this same network. This is called
a network externality because it implies that external actors benefit
from a particular transaction even if they have not participated directly
in this transaction. This is the case with the internet, as we explain in the
next paragraphs. One version of this is found in Metcalfe’s Law which
states that, ‘the value of a telecommunications network is proportional to
the square of the number of connected users of the system (n2)’ (https://
en.wikipedia.org/wiki/Metcalfe%27s_law).
When the internet was created, its value was very low. It was a
communication system used by a few people around the world in
universities and research labs. At that time, access to the internet was not
open and the system to access the network was not at all user friendly by
today’s standards; not many people had or used email. In 1993, when the
internet was opened to commercial use, commercial providers of email
started offering services. Quite quickly, companies and individuals opened
email accounts. As more companies and individuals joined, others saw
the potential benefit for them and joined too. As more people entered the
network, all members gained benefit.
We also should think about negative impacts, such as cybercrime, breach
of privacy, ‘fake news’ and cyber bullying. These can be called negative
network externalities, as they are damages or potential damages
which increase because more people are in the network. For instance,
if few people use internet banking, criminals would not have the same
incentive to go online trying to trick customers and hack banks and credit
card companies. Some cyberattacks have become iconic examples of the
fragility of the whole system in face of these network externalities. For
instance, in 2011, Sony PlayStation was hacked, affecting 77 million
95
IS1181 Digital infrastructures for business
96
Chapter 8: Core ideas for evolving infrastructures II: standards and network externalities
98
Chapter 9: Economics and institutional perspectives on digital infrastructures
9.1 Introduction
Observing the pervasiveness of digital infrastructures in contemporary
societies, you may ask how we can explain their rapid rise. This chapter
introduces some theoretical perspectives that can help us understand why
digital technologies in general and digital infrastructures in particular
have spread across the world so rapidly. The chapter explores perspectives
from economics and from institutional theory. It is not the objective of this
chapter to give a very detailed account of these theories, rather to give
short summaries of the key ideas. The aim in adopting this approach is
to provide some simple alternative ways to explain the success of digital
infrastructures and give enough background to the ideas so they can be
applied directly in the next chapters. This chapter also connects digital
infrastructures with digital goods considering that digital goods depend
on digital infrastructures to reach end-users and digital goods add value to
digital infrastructures, because they are essential channels for distributing
these goods. For further understanding of each the topics, we recommend
additional readings listed below. The chapter ends with a short
introduction to the resource-based view of the firm (RBV) to emphasise
the strategic value of digital technologies for individual firms as a way to
build competitive advantage.
99
IS1181 Digital infrastructures for business
100
Chapter 9: Economics and institutional perspectives on digital infrastructures
101
IS1181 Digital infrastructures for business
103
IS1181 Digital infrastructures for business
Lastly, the internet has enabled tools for reducing policing and
enforcement costs. This has been possible especially with the growth of
social media, on top of the internet. If a contract is respected and both
parties are happy, the policing and enforcement costs are minimum,
mainly reduced in the work of checking whether the expected product or
service has been delivered within the expected quality. In the past, when
this did not happen, there will be a private dispute between the parties.
A customer would never know what the other customers were saying
about the company. Nowadays because of social media, people can publish
online their disappointment in relation to companies and products. As this
affects the reputation of sellers, companies have to do their best to try to
sort out the problems with customers as soon as possible. In sum, policing
and enforcement costs are reduced too, considering buyers and sellers
have access to the internet and interactive interfaces such a social media.
Transaction costs can suggest one of the main reasons digital
infrastructures have become so pervasive. And the more apps are built on
the top of each layer of a digital infrastructure, the more we can foresee
these transaction costs going down. For instance, the British payday
loan company Wonga (out of business since 2018) created an algorithm
to check online the probability a person could payback a small loan
for a short period. Using online public information about individuals,
the company reduced the risk of default by checking the capacity of
individuals to pay for their loans. Although the company had controversial
practices of high interest rates, this is an interesting example of a company
trying to use public information about individuals to make decisions on
whether the person is a good or bad risk for a contract, thus reducing their
transaction costs.
104
Chapter 9: Economics and institutional perspectives on digital infrastructures
electronic book a million times for a million readers around the world?
The answer is that the cost is so low that we can almost ignore it. In
other words, the marginal cost of production would tend to zero (or be
very close to zero) and thus the price will tend to zero too, following the
mainstream economic perspective of relating prices to marginal costs in
a competitive market. Think of music for example. In this situation, the
problem is that there are no incentives for the producers of such a good.
This was not the case if a million copies of a paperback book were printed
and distributed across the world, or an old-fashioned music CD.
Recently economists have been developing new theories to understand the
difference between physical and digital goods and how goods are wrapped
up in services – think of a plastic DVD as a product (physical good) vs the
Netflix streaming service. They are also interested in how we can ensure
incentives for companies to keep innovating and selling digital goods
despite risks, such as piracy and copying, which may drive the price down.
The next paragraphs summarise the properties of digital goods, following
mainly the work of Danny Quah (2002). The idea is not to explore all
possibilities for defining digital goods, considering the limitations of this
subject guide, but to give you a flavour of the discussion, which is going
to be useful later to understand the discussion on digital products and
services in Chapter 14.
Nonrivalry: Digital goods are nonrival, meaning that when a person uses
it, there is no degradation of the good for another person to use too; there
is no difference between the original and the copy. By contrast, think about
food: if you eat an apple, the second person cannot eat the same apple.
‘Ideas’ are in this sense nonrival, but we do have ways such as patents
and copyright to change this – see below. A paper book in a library can
be borrowed by one person or another, but two people cannot borrow the
same book at the same time. A copy of a digital book can be accessed by
many people at the same time. Each person can have a copy of the original
one, without disturbing the reading of others. And this for a cost which
is close to zero. You can easily think of other digital goods or services like
this such as ideas, computer software, photos and videos, films, music,
newspapers, electronic games, online educational material or artificial
intelligence-based medical advice services.
Infinitely expansible: Digital goods may be quickly copied providing
many with a copy at almost no cost. Although producing the first
copy may be expensive, the reproduction is not. Again, ideas have this
characteristic of being infinitely expansible, being able to be thought and
used by an infinite number of people at any given time. There is a specific
characteristic with this feature because the price of a product which can be
reproduced infinitely tends to go to zero. However, there are some costs
for producing such products. In a situation in which the reproduction of
the digital good is not regulated, innovators would not have incentives
other than intrinsic motivation to create new products, as they would not
be able to sell the product for a good price. Two common solutions here
are found in the laws for patents and of copyright which gives a legal right
to restrict and put a price on copies being made – even if this not always
successful in the end. The open-source software industry, in contrast,
relies more on intrinsic motivation to make people want to contribute to a
product that will be freely distributed.
Aspatial: Digital goods are nowhere and everywhere at the same time
– they are highly and swiftly transportable. For sure digital goods are
inscribed into servers and physical devices and in this sense one can see
105
IS1181 Digital infrastructures for business
their presence in a particular space. But here Quah is concerned with the
nature of the digital good being communicated. More directly we can see
that while shipping physical goods around the world takes time and costs
money, digital goods move easily, rapidly and cheaply.
Recombinant: Digital goods may be recombined in different forms, in
such a way that original works can be generated at a low cost. YouTube
has plenty of such examples, in which people create videos from films and
songs, for instance. Another example is the use of digital maps (such as
Google Maps) to pinpoint a particular address and distribute the image
online. Recombination of contents enables high levels of creativity, as the
recombination of content is limitless (see also the concept of generativity).
106
Chapter 9: Economics and institutional perspectives on digital infrastructures
107
IS1181 Digital infrastructures for business
From the perspective of this subject guide, institutional concepts are useful
for understanding the role of digital infrastructures in contemporary
societies and the reason why they have become pervasive. The institutional
view adds a different perspective somewhat different to the economic
ones. You can read more in Scott (2001) and Silva and Backhouse (1997).
The institutional perspective focuses on social structures, which can be
interpreted as the way people behave in a particular circumstance. These
social structures may be supported by many social elements. For instance,
rules and norms may enforce a particular sort of behaviour. In addition,
technology may also be an instrument of enforcing a particular behaviour.
On the other hand, the beliefs and cognitive frameworks which are
internalised by people also affect the way designers, developers, sponsors
and society as a whole understand what a particular technology can do
and how it should evolve. The interplay between technology and society is
intermediated by institutions.
From the institutional perspective, we can derive three conclusions which
apply for digital infrastructures. First, institutional forces influence the
way digital infrastructure is designed and organised. Second, digital
infrastructure influences the way people behave. Third, the adoption of
digital infrastructure is influenced by the collective interpretation of a
variety of social actors. These three statements are explained below.
Institutional forces influence the way digital infrastructures
are designed and organised: As we know, infrastructure is not
developed out of the blue, only because of someone’s creative mind.
Innovators may create any sort of technology they wish; however, if an
infrastructure is going to thrive, it is because institutional forces are able
to influence the structure and architecture, in order to get the outcomes
desired by social actors who represent institutional forces. From this
perspective, we can study the development of digital infrastructures taking
into consideration the aligned interests of those who have fostered the
development of particular services, protocols or applications, rather than
others.
Digital infrastructure influences the way people behave: This
means that digital infrastructures are not neutral, in the sense that the
design/evolution process inscribes particular features and that these
features frame the way people use the infrastructure. For instance,
Facebook has a particular way of organising information. If you would
like to organise the information in a different way, the tool is not going
to be helpful. Facebook decides through an algorithm who is going to see
your posts. It is not possible for you to define either who is going to see
your post organically or what you are going to see on your homepage. Any
piece of technology has this characteristic for enabling some actions and
constraining others. Facebook promises to show you only relevant things
of interest to you, but the cost of this benefit is that Facebook also decides
what is not relevant for you (you may disagree with the algorithm’s
choices). Overall, Facebook can influence what you see and thus the way
that you behave.
The adoption of digital infrastructure is influenced by the
collective interpretation of a variety of social actors: This
means that the diffusion of use of a particular infrastructure does not
depend only on the technical characteristics, or of the economic benefits
it can bring. From this perspective, the most important influence is the
way a relevant group of social actors, such as academics, consultants,
influencers, vendors, consumers, journalists etc., are able to form a
108
Chapter 9: Economics and institutional perspectives on digital infrastructures
109
IS1181 Digital infrastructures for business
110
Chapter 9: Economics and institutional perspectives on digital infrastructures
2. Do you believe that society needs to find new ways of diffusing digital
goods in order to get more benefits for us all? Suggest four examples
of digital goods or services that might be better developed through the
means of procurement or patronage.
3. Drawing upon the basic ideas of institutional theory, explain how this
theoretical perspective help you to understand the diffusion and reach
of social media services such as Facebook.
111
IS1181 Digital infrastructures for business
Notes
112
Chapter 10: The world wide web and web engineering
Chapter outline
This chapter turns attention to the world wide web. It introduces the
web in terms of its history and development and its place as the world’s
primary information infrastructure. It is sometimes referred to as the
internet’s ’killer app’, the one application that made vast numbers of
people want to be users of the internet. The chapter considers the
development of the web from Web 1.0 – a static web – to Web 2.0 – a
dynamic and transactional web. In the context of Web 2.0, the chapter
considers the new technical discipline of ‘web engineering’ and contrasts it
to older and more established ideas of ‘software engineering’.
10.1 Introduction
The world wide web (WWW or just ‘the web’) is an information
infrastructure that runs on the internet (e.g. in layers on top of TCP/IP). It
in turn underpins many of the most important, widely used and influential
digital services in the world, for example most e-commerce uses the web,
all manner of reference sources, government services, online education,
video sharing, social media and many more.
The web started out from a simpler ambition, to make the information in
documents stored on computers available to people across the internet.
From the outset the web was intended to allow access to many kinds of
digital objects in many formats (text files, PDF files, spreadsheets, audio
and video files, pictures etc.) and at many locations. The primary type of
object that can be accessed using the web is the web page.
A web page is a kind of digital document that normally contains both
information (e.g., text) and links to other web objects (hyperlinks).
Indeed, the core innovation the web brought when it was first developed
in the late 1980 and early 1990s was to allow any given web page to
contain hyperlinks that lead on to other documents and pages. A hyperlink
is a direct link in one document or web page that embodies an IP address
in the form of a URL. Click on or select that link and you move on to the
referenced web page. We are very familiar with these hyperlinks in web
pages, seeing them as either explicit and clickable URLs e.g. https://
en.wikipedia.org/wiki/World_Wide_Web, or as embedded in a clickable
word, phrase, picture, or icon.
By using hyperlinks there is no prescribed or hierarchical set of files,
folders or directories that need to be traversed to go from one page/object
to another – the web is not like a neatly and consistently organised filing
cabinet where specific information is located in a pre-designate place.
Rather, the links are created by people as they come to understand their
particular needs. It is the user/author of any given page who sets and
revises the hyperlinks and more who generally can update a page as and
when they want. Information is more dynamic and able to be reconfigured
as and when it seems appropriate.
The implications of this freedom for authors/publishers and for how we
access and present information has been profound. Now everybody can
be an author and (potentially) reach almost everybody else in the world.
113
IS1181 Digital infrastructures for business
The digital economics of the written word, music and visual materials
has profoundly changed too. The amount of information in circulation in
the world has exploded and much of this is now accessed ‘for free’ – for
example do you buy a newspaper – or do you access news ‘for free’ –
leaving aside the adverts?
114
Chapter 10: The world wide web and web engineering
115
IS1181 Digital infrastructures for business
Web content
Web page, pdf file,
photo, video etc
Protocols: Application
HTTP, HTTPS etc.
Web server software Content: Web browser
Apache, IBM HTTP server, HTML, Javascript etc. Chrome, Firefox, Explorer
Tomcat etc. Safari etc.
(browser) to make the best effort to achieve this. As you may have noted,
this has echoes of how the internet also works on a ‘best effort’ basis and it
allows the two ends of a communication to ‘negotiate’ when things break
down of become difficult – think of TCP.
The use of a client-server architecture for the web and the use of HTML
are both clever choices that distribute the work of getting and displaying
information between the server who will find the page requested and
send it as a standard set of data including text and HTML mark-up and
the client who does the work of rendering the data for the screen of the
specific device as best it can. HTML is a global standard, so if the server
sticks to HTML then any client machine or software that knows HTML will
work. Again, we might see this as a return to the logic of the early era of
the internet when architecture was found that could support all kinds of
machines and adapt to them as they developed and grew. We should also
note that HTML has gone through different versions over time, but these
are generally ‘backwards compatible’ so using a new version does not
make all websites using older versions inoperable.
Figure 10.1 is a simple depiction of a basic web architecture (its structure).
It is, however, limited to the model of browser (with human user) and
server (machine with web pages). But we could expand this figure in two
ways. First to include the search engines that are a central part of the web
and second to include the many machine-to-machine interactions that the
web supports (including the search engine web crawlers). If you were to
redraw the figure including these elements, how would you do this? More
generally when we think about the architecture of any infrastructure we
need to look at the fundamental relations of the element involved and
that usually means looking into the variety of exchanges, processes and
functionalities.
118
Chapter 10: The world wide web and web engineering
Most search engines are fairly literal, even a bit dim. They take words
and phrases and index the web on this basis. But there are many people,
including Tim Berners-Lee the web’s originator, who are trying to create
a different kind of web – the semantic web – which has a better sense
of what things on the web ‘mean’ than is possible from text strings. For
example, in the case of a video on the web, or a picture, or a poem it is
quite difficult for a program to analyse ‘what it is about’, other than from
the title. But in a semantic web, with the associated infrastructures, this
might be possible and take us closer to the web as a global ‘brain’. (Do you
think this is possible or desirable?)
The shifting and evolution of the web is often summarised in the idea
of an early, simpler, static Web 1.0 and a new, different, ‘upgraded’ Web
2.0. Of course, there is no one moment when it shifted and it is not really
about the web changing in technical terms (though that does happen –
infrastructures evolve), but rather our ideas of what we could do with it
changed. Ideas of Web 1.0 and 2.0 have been around from about 2004
(read O’Reilly, 2005 and the Wikipedia page on ‘Web 2.0’). And some
people want to move on the debate to Web 3.0 or 4 and so on.
There are some changes that we can identify in how the web is
experienced and used by people which add up to Web 2.0.
For example, in Web 2,0 people interact more with each other, people
generate more of the content (user-generated content) e.g. in Blogs,
Vlogs or Facebook. Another powerful example of user-generated content is
the online encyclopaedia we recommend in this course, Wikipedia, where
the content is the product of many enthusiastic volunteers. More generally,
using Web 2.0 people can join in specific interest groups (virtual
communities) which may transcend traditional geographic boundaries
and can have interests ranging from politics to stamp collection to 1930s
baseball statistics. People also expect to comment on others’ efforts,
contribute to them or use them for their own purposes, for example in
photo sharing sites like Flickr.
Some of the changes for Web 2.0 are in the services that the web can offer.
In Web 2.0 there are many more transactions on the web. For example, the
kinds of transactions (and security) needed to have electronic commerce.
This includes, of course, financial services that let people pay online and
to help them trust as website they may have never heard of before. More
generally we can say that the Web 2.0 is a web where different services
(or servers) can interact together to deliver new kinds of service for web
users. E-commerce again gives an example of how a website that sells,
say, clothes links to PayPal for secure payment services and to a courier
company to deliver the parcel. It may also ask its customers to comment
on the goods it offers and give positive or negative reviews of specific
products. All this happens on the web, in careful interactions among their
119
IS1181 Digital infrastructures for business
separate companies and their clients, each providing separate parts of the
service you want.
120
Chapter 10: The world wide web and web engineering
121
IS1181 Digital infrastructures for business
Notes
122
Chapter 11: Cloud computing as an innovation in infrastructure
Chapter outline
This chapter aims to further develop the concept of cloud computing
(introduced in Chapter 2). We conceptualise cloud computing, explaining
the origins of cloud computing, the reasons why cloud computing has
become a pervasive model for providing computing services, the types
of cloud computing and the risks this digital infrastructure presents. We
emphasise in the chapter the layered architecture of cloud computing,
supported by communication standards, the network effects and
economies of scale of cloud services and some aspects of how cloud
services have enabled innovation in digital infrastructures.
11.1 Introduction
Chapter 2 introduced the idea of cloud computing. We need now to have a
more formal definition of cloud computing, to account for the complexity
of this system. The National Institute of Standards and Technology (NIST,
a US institution), defines the term as follows:
123
IS1181 Digital infrastructures for business
124
Chapter 11: Cloud computing as an innovation in infrastructure
127
IS1181 Digital infrastructures for business
128
Chapter 11: Cloud computing as an innovation in infrastructure
129
IS1181 Digital infrastructures for business
130
Chapter 11: Cloud computing as an innovation in infrastructure
131
IS1181 Digital infrastructures for business
Activity 11.5: Companies facing the challenges and risks of cloud computing
Research online examples of companies who have faced problems for using cloud
computing. Link the cited problems to the challenges and risks listed above. Try to find
further risks of using cloud computing.
132
Chapter 12: Mobile technology as an innovation in infrastructure
12.1 Introduction
One of the key characteristics of our contemporary societies is the presence
of mobile technology in our hands. From very rich to very poor countries,
the mobile phone is there, supporting communication and interaction. For
some, it is the device of choice for doing business and work on the road.
For others, it is the best way of keeping contact with family and friends,
sharing nice memories. Some would spend lots of time playing games in
the devices. Others would see an opportunity for preparing for an exam
using e-learning interfaces. All the many functionalities that are available
today through mobile technologies have become possible with the
development of smart interfaces and compact computing for processing
large volumes of data in small devices.
The more capacity the mobile device has to process data locally and
the more speed it has to transfer data, the more the operating system
evolves to support more services and the more developers are interested
in providing apps to run on the top of the operating system. Through this
path, mobiles have evolved from being just pagers (to send short texts
only), to become phones for conversations and later devices with huge
computing capacities, with GPS, internet browser, broadband connections.
Indeed, today mobile operating systems have evolved to become platforms
for all sorts of apps, which are specialised software applications which
run on mobile phones and tablets (Chapter 17 gives details on the
conceptualisation of platforms).
Thinking from the perspective of the hourglass architecture (Chapter 6),
there are many elements embedded in each layer of the current mobile
infrastructure. The final result we have in our hands is the combination
of hardware, software and a collection of services, which are supported
by other layers of hardware, software and services which are behind the
local infrastructure of mobile cell towers and corporate infrastructures
which manage the services offered to support the whole mobile industry.
All the parts of this complex infrastructure of layers upon layers rely on
communications standards which connect each element to each other,
allowing each part to develop with a degree of independency from the
whole systems, at the same time that the development of some elements
enable other advancements in other parts of the infrastructure. Every
time a standard is not well developed or not agreed across the many
stakeholders responsible for the whole system, parts of the functionality of
the mobile technology infrastructure is jeopardised.
133
IS1181 Digital infrastructures for business
134
Chapter 12: Mobile technology as an innovation in infrastructure
135
IS1181 Digital infrastructures for business
Business benefits
Businesses have strongly benefited from mobile technology infrastructures
in the last decades, favoured by the reduction in costs of communication
and increase in the speed of access to data. Research prepared by Boston
Consulting Group (BCG) (Bezerra et al., 2015) shows that the cost for
using mobile devices for accessing data has decrease more than 90% from
2005 to 2013. This has happened mainly because the new generations of
mobile network technologies are much faster, with a massive migration
of users from obsolete networks to new ones. To give an example, the 4G
networks are 12,000 times faster than the 2G networks. Consumers accept
paying more for getting more efficient access to content in their mobile
devices.
In a broad sense, mobile technology brings interactivity and access to
information, enabling businesses to offer new products and services and
better customer engagement and to change operational processes to gain
productivity. For instance, employees may have access at any place to the
customer relationship management system and give a better advice to
the client. Customers may search for prices and product descriptions and
pay for their purchase in their mobile devices, or they may even use the
mobile phone for making payments (for instance, using NFC – Near Field
Communication). Employees may work from any place, saving commuting
time and giving better support for customers in the place of their choice.
Collaborative technologies available through mobiles give easy access to
experts. Integration of calendars and contacts in the mobile makes easier
for professionals to manage their diaries and find the people they need at
the correct moment. Localisation services help to provide better services
when your customer is at the door, such as offering a free coffee to a
regular customer and allowing your sales professionals to use GPS services
to quickly find the directions to the client.
Researching the impact of these technologies on SME businesses
(small and medium companies), BCG has concluded that there is a
substantial benefit for the companies which have led the adoption of
mobile technology infrastructures. Considering a survey with around
3,500 SMEs in the USA, Germany, South Korea, Brazil, China and India,
the research shows that these companies have benefited in terms of
reaching more customers, responding to the expectations of customers
in terms of availability of business in mobile devices and growing faster
than competitors. These leaders claim that mobile technologies have
allowed the company to pursue new business opportunities and to
change the business processes. Finally, they claim that mobile technology
has improved their access to real time information, increasing business
productivity and capacity of innovation.
137
IS1181 Digital infrastructures for business
138
Chapter 12: Mobile technology as an innovation in infrastructure
accessing the company’s data and information from any place. Some
consultants call this phenomenon ‘IT consumerisation’.
Instead of fighting with employees, many companies have accepted
the BYOD movement, seeing also an opportunity of benefiting from an
investment which is done by the employees. Advocates of the model argue
that BYOD increases productivity, as employees invest their own time to
learn how to use and maintain the device and are also more motivated
for having chosen their own working tools. On the other hand, there are
serious security risks: when not properly protected, these devices can be
lost or hacked, giving criminals an entry door to the company’s data and
businesses. For this reason, companies which adopt the BYOD approach
need to give employees support for the use of the technology and need
to have special measures to protect the security of its assets. Encryption
of devices and clear policies for accessing and storing data are among
the measures which help the company to protect its information when
employees use their own devices.
139
IS1181 Digital infrastructures for business
140
Chapter 12: Mobile technology as an innovation in infrastructure
shop or restaurant and observe how many people are interacting with
their mobiles at any given moment, even when they are in face-to-face
conversation with other people. Indeed, one can probably see this at home
too. Once people form an opinion on the combined benefits of mobile
technology and start using this technology everywhere, it becomes more
difficult to imagine one’s life without this interface.
The BCG’s research (Bezerra et al., 2015) has shown that more than
50% of mobile users would give up of going out for dinner, having a
pet, or going on vacation it this sacrifice would be necessary for keeping
their mobile devices. More than 50% would also give up a day off work
per week in exchange for mobile connection. Happily, we can keep
all. However, this research shows that mobile technology has become
a fundamental part of our lives, information which is confirmed by
many other research reports. One can question, however, whether this
happens because of actual benefits or because of perceived benefits, or
even because of social norms: as everyone is online 24/7, as everyone is
communicating through social media, no one wants to be left behind.
141
IS1181 Digital infrastructures for business
142
Chapter 12: Mobile technology as an innovation in infrastructure
In Chapter 14, we come back to this topic of app services, discussing more
on the sort of functionalities they offer.
143
IS1181 Digital infrastructures for business
Notes
144
Chapter 13: Social media as an innovation in infrastructure
13.1 Introduction
Social media is the generic name we use to conceptualise a category of
digital tools that allow individuals and organisations to create and share
information and knowledge, to communicate and to collaborate with
each other through computing infrastructures. These communication and
collaboration efforts may be in closed groups (such as on Facebook and
LinkedIn), or they may be in public spaces in which anyone can participate
(such as Twitter and some blog services). Some people prefer to use the
term social technologies to refer to these tools, including in this case the
proprietary tools offered to companies to foster collaboration among
employees and contributors (such as Microsoft’s SharePoint and Teams
and IBM Connections).
The fundamental aspect of this definition is the capacity for interacting
through social media, using Web 2.0 applications (which allow people to
publish their own content and comment and rate the content of others).
In this direction, social media offer a tool for people to generate their own
content and to build their own social networks. The value of social media
infrastructures emerges from the interplay of an enabling tool (which
allow people to create profiles, write content, publish photos and videos
and connect to others) and millions of individuals who believe there is
value in interacting online with other people. There would not be social
media if the user would not be interested in generating content for sharing
in these interfaces, and in giving a great amount of time to interact with
the content of others too.
Social media started, nonetheless, a long time before the facilities of
Web 2.0. The first interfaces of social media were computers connected
to private networks, which would allow users to access discussion lists.
These discussion lists would be hosted by organisations, which would have
dedicated servers to keep track of the email conversation. The idea behind
the creation of discussion lists was that computing technology would
enable people to form communities mediated by digital technologies.
These communities would be able to share content, but also would also
allow people to give emotional support to each other. At that time though,
the concept of cloud services was not fully developed. Then individual
organisations would need to build their own digital infrastructure to host
the discussion lists in their servers. Today, companies such as Facebook,
LinkedIn and WeChat offer the services in the cloud, thus nobody needs to
concern about investing in their own digital infrastructure.
145
IS1181 Digital infrastructures for business
So, the idea of building communities was present in the very beginning of
the first conceptions of social media, although at that time nobody called
these tools ‘social media’. Thus, this chapter focuses on the community
roots of social media and how this affects the use of these tools for
collaboration, innovation and marketing.
146
Chapter 13: Social media as an innovation in infrastructure
Deiser, R. and S. Newton ‘Six social-media skills every leader needs’ McKinsey
(2013)
Johnson, S. Where good ideas come from: the natural history of innovation.
(New York: Allen Lane, 2010) [ISBN 9781846140518].
Kietzmann, J.H., K. Hermkens, I.P. McCarthy and B.S. Silvestre ‘Social media?
Get serious! Understanding the functional building blocks of social media’,
Business Horizons 54(3) 2011, pp.241–51.
McAfee, A. Enterprise 2.0: new collaborative tools for your organization’s toughest
challenges. (Boston: Harvard Business Press, 2009) [ISBN 9781422125878].
Smith, N., R. Wollan and C. Zhou The social media management handbook:
everything you need to know to get social media working in your business.
(Hoboken, New Jersey: John Wiley & Sons, 2011) [ISBN 9780470651247].
Statista websites: http://www.statista.com/ and http://www.statisticbrain.
com/youtube-statistics/
Tuten, T. and M. Solomon Social media marketing. (Harlow: Pearson, 2013)
[ISBN 9781292023533].
We cannot forget to say that the Chinese government has blocked many
of these social media services in China, in order to keep control over
the communication of their citizens. For this reason, we can find other
social media tools available in China, with similar functionalities, but all
controlled by the Chinese government. For instance, Chinese people use
the microblogs Sina Weibo and Tencent Weibo, the social network WeChat,
the instant message services QQ and the video sharing interface Youku. All
these tools have very similar functionalities to the social media channels
147
IS1181 Digital infrastructures for business
we focus on in this subject guide. We can see then that many more people
are using social media, even though we may not know about these tools.
WeChat alone has around 1.3 billion users (2021).
In the case of social media, size matters. The fact that people are using the
same social media service to communicate with each other speeds up the
process of communication and of getting new connections. Think about
your own experience. You meet a new person and would like to keep in
touch with them. Immediately you connect through social media tools, such
as Facebook, LinkedIn and WhatsApp. If you like the opinions of a person,
you just follow them on Twitter and check to see whether they have a blog.
In this way, you preserve this valuable connection for the future. The fact
that we are using similar communication channels leverage the capacity we
have of building and maintaining connections in the long term.
You also can get to know people through digital interactions. You may
belong to a discussion group about a topic and you may find other
interesting people with whom you would like to be connected, even if
only through digital intermediation. You see some friends of your friends
publishing interesting ideas and you connect to them, or follow them. You
choose with whom you would like to connect (and vice versa, others may
connect or not with you) and the terms of the interaction are to be agreed
between both, considering the limitations of the tools and the level of
privacy defined by the parts.
There are a great variety of social media tools and different authors
have classified these technologies in different ways. A comprehensive
classification has been proposed by McKinsey Global Institute (Chui et al.,
2012):
• social networks (enable connections through profiles)
• blogs/microblogs (focus on publishing content, although it also allows
connections)
• ratings and reviews (evaluation of products, services and opinions)
• social commerce (group purchasing and sharing opinions on products
and services)
• wikis (creation and storage of knowledge)
• discussion forums (spaces for debate and access to expertise)
• shared workspaces (co-creation of content and projects)
• crowdsourcing (harness collective knowledge or pool of resources)
• social gaming (game interfaces for playing with others)
• media and file sharing (sharing of content).
There are many tools which would be classified in one or more of these
categories.
In global research, McKinsey Global Institute has concluded that companies
are using social technologies for a variety of applications (Chui et al.,
2012). For instance, for product development, social media is an excellent
channel for getting insights from customers and even to engage customers
and contributors in the co-creation of products. For operations, social media
may help forecast a particular context and distribute work. For marketing
and sales, social media has become one of the main channels for advertising
and branding (see more in Chapter 14), in addition to bring customers’
insights, generating sales leads and favouring social commerce. Related to
marketing, it also allows a better customer service. For business support,
social media improve collaboration and communication within the firm
148
Chapter 13: Social media as an innovation in infrastructure
and beyond, enabling an easier system for matching expertise and skills to
defined tasks.
This report (Chui et al., 2012) concludes that a large majority of
companies benefit from using social media as channels for getting
quicker access to knowledge, from internal and external experts. On the
top of this, communication, travel and operational costs are reduced.
Overall, companies with good use of social media have seen increases
in productivity, reducing, for instance, the time spent on emails and
searching for information. However, this does not work for everyone and
in every situation (see section on risks and challenges in Chapter 14).
The holy grail of getting more benefits from innovation needs to be better
explored though.
the concept of Enterprise 2.0 based upon the idea that social media
reinforces our weak and strong ties with people we already know and
simplifies the connection with people who we do not know yet. Access
to people is thus a key benefit of social media: a company may get easier
access to experts and creative customers, for instance.
An alternative view focuses on knowledge, emphasising that knowledge
emerges from the interaction among people. Taking this perspective, we
could see the benefit of using social media to enable the formation of
communities of experts. The pool of knowledge which emerges from such
a community is bigger than the parts: knowledge is recombined through
conversations and experts can rely on each other’s strengths to reach new
levels of understanding. In this direction, the concept of communities of
practice may be helpful here (see more details on Brown and Duguid,
1998). These communities are organised groups of people who share
common concerns and passions in a particular area of knowledge and are
willing to share their knowledge and concerns with others within these
groups (which may be restricted to the boundaries of an organisation
or be broader communities organised by digital interfaces). From this
perspective, social media is an interesting way of facilitating and fostering
the communication in communities of practice.
A third view of the relevance of social media collaboration comes from
authors who study innovation processes. Doing a historical analysis of
innovations for the last centuries, Steven Johnson (2010) brings a very
interesting view on the value of collaboration. He argues that what matters
for innovation is not only the number of nodes in a network, but the way
these nodes are connected and the quality of their interaction. In order to
have more innovation, people should be inside environments in which all
are exploring new boundaries. In this direction, the internet and the social
media are infrastructures which favour innovation, through improving the
connections and the quality of the interactions among experts.
In a further analysis, we can also discuss how social media may enable
humans to create new social structures for knowledge creation and
innovation. The idea behind this thought is that we can create spaces
for collective superintelligence, through new forms of organising and
linking individual human minds and artefacts (see more in Bolstrom,
2014). The idea is that superintelligence could emerge from the positive
network effect of connecting people and content in particular ways,
breaking complex problems in manageable equations, for instance. Digital
infrastructures in general provide means for large amounts of content
to be available and reachable – think about the internet and the WWW.
In particular, social media tools provide the means to connect people,
enabling news ways of organising collaboration. As communication
costs are reduced and social media tools provide details on the profile of
individuals, it is not difficult to foresee the emergence of algorithms to
foster collaboration and innovation. Today the focus of algorithms is on
marketing and searching, but the technology behind algorithms is evolving
to other areas. The more people are educated and connected through
social media infrastructures, the more we can expect developments in the
direction of fostering collective superintelligence.
Using an economic perspective to interpret the benefits of using social
media, digital collaborative technologies allow more direct interaction
between participants. This makes part of the coordination efforts
redundant, allowing the company to reduce the managerial levels in a
hierarchy. The speed of the process also could be increased, again reducing
150
Chapter 13: Social media as an innovation in infrastructure
151
IS1181 Digital infrastructures for business
152
Chapter 13: Social media as an innovation in infrastructure
153
IS1181 Digital infrastructures for business
Damage to reputation
There are many ways in which reputation can be damaged on social media.
We focus here on situations in which customers have made public their
complaints about products and services, gaining viral attention from other
154
Chapter 13: Social media as an innovation in infrastructure
Lack of strategy
Many companies start using social media by following others, without
carefully thinking how social media would help the organisation to get
closer to its strategic objectives. Without aligning social media with
business strategy, the organisation runs the risk of not choosing the right
tools and the right level of support in the use of tools. Companies need to
think in advance how about the coordination of efforts across departments
and units and ensuring consistency in the content which is made available
in different channels. They also should have a plan on how to collect and
analyse data generated by social media and how to make policies for using
social media clear, with rules for reward and accountability. Similarly,
professionals should have a clear strategy for individuals’ use of social
media. See more on this matter at Smith et al. (2011).
155
IS1181 Digital infrastructures for business
Lack of leadership
People may be interested in participating in social media, but they are not
sure of the benefits and risks. In corporate environments, organisations
may work to provide such leadership. First, leaders should keep social
media activity in alignment with the corporate strategy, designing proper
social media architectures (the combination of tools and features).
Second, they should use analytics to drive their actions, recommendations
and capacity for coordinating the efforts of others. Third, they should
guarantee that the content produced is relevant, that the correct people
are reached by the communication and that users have means to filter
the content in accordance with their needs. See more on social media
leadership in Deiser and Newton (2013).
156
Chapter 14: Delivering digital products and digital services
14.1 Introduction
This chapter looks at a collection of examples of products and services
supported by digital infrastructures. Although we separate products and
services in accordance with the digital infrastructure, this classification is
somehow flawed, as any of these products and services also depend on
other digital infrastructures to operate. For instance, games are services in
social media and apps in mobile technologies, but both depend on internet
infrastructure to work and people play games through social media in
mobile devices too. As we have argued before, all digital infrastructures
discussed in this subject guide are connected to each other in layers. For
this reason, it is not possible to say that a particular product or service is
only related to one digital infrastructure.
In addition, this chapter does not aim to be either an exhaustive
description of all sorts of products and services (this would be impossible
anyway), nor a deep analysis of any of the examples. The goal here is just
to offer an introduction to key products and services, some well-known,
others still becoming more relevant. We try to keep a balance though, to
offer you a vision of the variety of products and services that are available
for individuals and organisations. We also bring examples of digital
products and services developed as a response to the Covid-19 pandemic,
which demonstrate the generative potential of digital infrastructures in
face of changes in the environment.
We want you to learn about different products and services, to understand
some current developments which may become massive infrastructures
in the future and to try to connect these products and services among
themselves. As argued in Chapter 12, the variety of apps are such that
mobile technologies has opened unlimited opportunities for businesses
to innovate just through the recombination of apps. This becomes even
more important when we see a broader horizon of digital products and
services which may be combined. Thus, we hope that this chapter shows
you a new perspective on innovation itself from a business perspective.
Being an innovator in digital business does not mean you are a developer
of software or a computer scientist. You may be a business innovator just
knowing how to combine digital products and services to get the best from
the available digital infrastructures.
157
IS1181 Digital infrastructures for business
158
Chapter 14: Delivering digital products and digital services
159
IS1181 Digital infrastructures for business
Localisation services
Mobile technology is the perfect host for all sorts of localisation services.
The basic one is offering a map, with GPS features (finding directions). It
is a fundamental feature to help people find their way to particular places,
leaving behind paper maps. It is also a way to improve customisation of
advertisements: a mobile provider knows you are interested in buying a
new bag and informs you of a promotion by your preferred store, which by
the way is just around the corner. Location services also help tracking the
delivery of products, such as when e-commerce services estimate the time
for a delivery. They can be also used to track physical activity, to check the
route used by sales professionals, to check alternative routes when there is
traffic on main roads. One can also find friends who are nearby to spend
time together, using location services such as FourSquare.
161
IS1181 Digital infrastructures for business
Databases
Mobile technologies have become a point for collecting and storing data,
which are useful to support other digital applications and tools. Your
mobile devices have the technology and data to know what are your key
interests and friends, which places you go regularly, when and by which
transportations means, what time you wake up and go to sleep, how
many steps you take in a day and even your heart rate. In some cases you
need to set up the mobile device for collecting the data, downloading the
specialised apps and allowing the data to be stored in a place for further
analysis, but not always. Your basic location, for example, is known by
default through the phone network.
There is currently a particular interest in collecting data with the help of
wearables, such as digital watches, wristbands and glasses. These devices
can help collect data from your movements and activities, for instance,
measuring the number of steps you have walked, the time you have run,
the total calories you have burnt in the day, how many hours you have
slept and so on. In addition, mobile phones have apps for you to add other
data, feeding a larger database which can be used by your doctors. Indeed,
these databases are powerful tools for us to know more about ourselves
and make informed decisions about changes which may be useful in
our lives. Based on the collected data, fitness apps may, for instance,
recommend new activities and exercises, gradually helping you to become
fitter.
Games
Digital games are a global success. They are everywhere. We have already
seen that many mobile apps provide games. Digital games may be accessed
from different channels, including social media. This happens because
social media facilitate invitation from friends to play the same games
together. If you like a game, the chances are that you want to share this
with your friends. Some games even use this human trace to leverage your
position in the game: the more players you bring to the game, the more
points and rewards you have. There is thus an immediate synergy between
social media and games.
162
Chapter 14: Delivering digital products and digital services
Analytics
Knowing your customer is a critical factor in business success. Companies
have always relied on surveys and demographics to know about customers
and potential customers, to better target advertisements and to better
develop products and services. Social media offers a short cut to the
process of better knowing your customer. Let’s think about Facebook, which
is the most relevant social media service. Facebook has crucial demographic
data of more than 2.9 billion people. But more important than this, it
knows with a high level of precision what people like, what are their more
recent interests, what that are talking about, who are their friends and
even how they feel today. Facebook’s powerful algorithm collects individual
data and adjusts the offering of ads in accordance with individual profiles.
Search for a product online that you have never been interested in before.
Now open Facebook and see which ads you are shown.
In addition to offering services to better target potential customers,
Facebook also offers advertisers the tools for receiving the data analytics
of their advertisements. With this tool, companies can check whether a
campaign is doing well and decide in which campaign they are going
to invest more. Data analytics allow companies to see how people are
reacting to the advertisement, with emoticons, sharing or commentaries,
on the top of the number of viewers. Based on the feedback, companies
can adjust their target audience by country, region, age and even by
interests (through key words). Other social media offer similar services.
14.2.4 internet
The internet is the core digital infrastructure that enables almost all
digital products and services. In this section we focus on a few classes of
digital products and services that have been significantly reshaped by the
internet.
Search
Searching is one of the most important services of the internet – it lets
us ‘find’ to ‘connect’ and ‘find out’. Much of this is powered the WWW
infrastructure and search engines, but also by social media posts. Antivirus
services complement the search services, for example checking whether
websites are safe.
163
IS1181 Digital infrastructures for business
Mashups
A mashup is any application which uses content from diverse digital
objects, available on the internet, to create a new product or service which
aggregates information from different sources to reach a particular the
mashup interface, the audience see one final object, but behind the scenes,
there are layers which are combined to provide the final result. A typical
example is a hotel chain which combines the address and images of the
hotel to Google Maps, offering customers better information of its location.
The mashups depend on the capacity of integrating different digital
objects. It is easier to do this integration when the developer has the APIs
(Application Programming Interfaces) of the platforms used (see more
details on platforms in Chapter 18). Mashups may be used by combining
free services and information – although ‘free’ is usually contested idea
online – or they may make payment for the use of third-party content.
Internet of Things
The internet of Things (IoT) is one of current developments of mobile
technology and digital infrastructures. The IoT means that digital
connectivity is associated with any physical device – from machines and
domestic devices to buildings or clothes – and that these digital elements
can communicate with the digital elements of other physical devices. Any
object can be connected to others, creating a network of communication
among objects which can send and receive data automatically. The digital
elements in each device are able to collect and distribute relevant data and
to respond to the information that they receive through the network. This
can allow remote control of individual objects, but also the pooling of data
164
Chapter 14: Delivering digital products and digital services
from multiple objects. These digital devices associated to things are able to
collect data to be used in the management of processes and problems. For
instance, adding biochips to farm animals may allow a farmer to manage
each animal’s specific diet and the whole farm better, gaining a level
of information which could not be captured otherwise. Digital devices
associated with machines, such as cars and airplanes, may measure
the performance of different parts of the technology, collecting enough
data to provide proper maintenance before they break. You can see the
immediate advantage of being able to collect earlier warning indicators
from machines, reducing the negative impact of having failures in critical
moments. The data collected by IoT contributes to the formation of large
datasets about the behaviour of materials and equipment. These big
datasets are used then to investigate patterns of behaviour by AI solutions
(e.g. machine learning).
The IoT is already very close to many of us, through mobile wearables.
When you have a digital watch tracking your activities, this means you
have a digital interface to transform your activity into data. The data
is then transferred to an online database, for you (or your healthcare
provider) to analyse it and make decisions on your health and physical
activities. You become a Thing in this big Internet of Things when you add
a wearable to measure your performance. On a larger scale, engineers are
applying the IoT to entire cities: the smart city movement (see more in
Chapter 19).
AI as a Service
Gradually, AI technologies are advancing. We are entering the era of
cognitive computing. These are technologies which somehow can ‘think’
by themselves, meaning they are able to mimic human cognitive functions,
including learning processes (machine learning). There is a long way to
go for such technologies to be able to do exactly what humans do and
some do not believe machines are ever going to have the same general
intelligence that humans have. On the other hand, machines are already
doing amazing things that humans alone cannot do. Interesting examples
are IBM Watson and Google DeepMind. These are powerful pieces of
software able to processes huge amounts of information from structured
and unstructured databases. Even more interesting: they can learn through
asking questions and comparing the results with other situations. They can
also generate new ideas that nobody has programmed in their system.
IBM has prepared Watson to be an AI platform. As such, Watson can
learn anything. Give Watson enough information and time and the
technology will learn anything (well… almost). The early application
for Watson has been in medicine and research related to medicine. After
being trained, Watson can now support many medical activities, such as
165
IS1181 Digital infrastructures for business
167
IS1181 Digital infrastructures for business
168
Chapter 14: Delivering digital products and digital services
169
IS1181 Digital infrastructures for business
Notes
170
Chapter 15: Governance and regulation of digital infrastructures
Chapter outline
This chapter aims to develop understanding of the governance and
regulation of digital infrastructures. The objectives of the chapter are to
explore some international regulations which affect digital infrastructures,
with particular focus on the internet and its governance and regulatory
bodies. The chapter explores alternative forms of governance and
points out some challenges in face of the difficulties to regulate digital
infrastructures.
15.1 Introduction
The layered model has been used in this subject guide to explain how
digital infrastructures evolve from fragmented pieces to actual products
and services which support contemporary economies and businesses.
We can use this idea of layers also to better understand governance and
regulatory aspects of digital infrastructures taking two perspectives.
The first is that governance and regulations are themselves layers of
digital infrastructures, as they affect the way the other layers are going
to interoperate and affect the way people and organisations are going to
use the other layers. The second is that governance structures of digital
infrastructures evolve through time as new uses and new users occur.
In the same way digital infrastructures evolve through the addition and
change of its associated elements within layers, the rules for governance
and regulations also evolve with shifting technologies and altered practices
of use. Nobody could have thought from the beginning how to guarantee
the governance of the internet because the network was always going to
evolved in ways nobody could foresee. And today, nobody really knows
how current digital infrastructures are going to evolve from now and the
governance and regulation that will be necessary.
There is a fundamental reason why we should care about the governance
and regulation of digital infrastructures. In a nutshell, these infrastructures
have become a fundamental part of the tissue of our economies and lives.
The more businesses and society are dependent on digital infrastructures,
the more we need to be sure that these digital infrastructures do not go
out of control. The fact is that digital infrastructures have become critical
for the wellbeing of societies and for producing wealth. We cannot run
the risk of having such resources being misused or abused. For instance, if
governance rules are not in place, a country may use the internet to attack
the digital infrastructure of another country, in a cyberwar. Indeed, we are
already in a disguised cyberwar: daily, companies and governments suffer
systematic attacks from criminals, some sponsored by governments, trying
to steal research, commercial data and security and defence information.
What would happen if a country could not use internet resources for
one week? And one month? What happens if a country has its mobile
communication system stopped by another government?
This chapter develops topics which can help our understanding of why it
is necessary to have governance and regulation of digital infrastructures,
to protect critical services in our economies and societies. However, it
is also necessary to be critical of how governance and regulations are
171
IS1181 Digital infrastructures for business
173
IS1181 Digital infrastructures for business
174
Chapter 15: Governance and regulation of digital infrastructures
175
IS1181 Digital infrastructures for business
176
Chapter 15: Governance and regulation of digital infrastructures
177
IS1181 Digital infrastructures for business
the same painting on Facebook. Should society have a say on this matter?
In trying to be a universal service for anyone in the world, Facebook has
created policies which are not consistent with the freedom many have
in democratic countries. Also, Facebook policy is imposed top-down,
not taking into consideration that national laws may protect freedom
of expression and speech of citizens who want to publish, for example,
artistic content of naked people.
178
Chapter 15: Governance and regulation of digital infrastructures
179
IS1181 Digital infrastructures for business
180
Chapter 15: Governance and regulation of digital infrastructures
181
IS1181 Digital infrastructures for business
Notes
182
Chapter 16: Issues of net neutrality and national borders
Chapter outline
This chapter discusses the topic of net neutrality and the difficulties of
thinking about principles for the whole internet as laws and regulations
are defined by national bodies. It takes the perspective that net neutrality
favours users and society as a whole, protecting citizens and democracies
against abuses from any sort of intermediary in internet communication.
In particular, the chapter presents the argument of empowerment, using
net neutrality as an instrument to empower society against abuses from
service providers and telecommunication companies. Some arguments
against net neutrality are also discussed. However, we take a perspective
here in defence of net neutrality.
16.1 Introduction
Net neutrality is the term used to define a particular form of distributing
information through the internet. In this model, ISPs, telecommunication
companies and governments (or any other third party between the content
provider and the user, or the sender of a message and the receiver) are
supposed to treat all pieces of information in the same way during the
transmission through the internet, neither discriminating against them in
terms of speed and priority of transmission, nor charging for any sort of
content in a different way, nor censoring or blocking any sort of content
that two parties wish to share. The same principle used for information
(content) should be applied to users, websites, platforms, applications,
access devices and forms of communication, which should not be
discriminated or charged differently. Net neutrality should guide the whole
internet traffic at any time and should be protected by legislation and
regulations, as proposed by those who favour this perspective.
This model is similar to that applied to telephone, water, gas and
electricity services – all regulated as public utilities. Electricity and water
go through the cables and pipes and the end user decides how to use it
in the household. Nobody but the end user decides how electricity and
water is used. There is no difference in fees for using the energy for the
computer or for the refrigerator, or the water for cooking or showering.
The same principle applied to the internet means that all pieces of
information travel without restriction through the network. Internet
traffic should be regulated as any other public utility. The end user is
responsible for deciding which pieces of information are required. Some
want to spend time on videos, others on news or emails. It is their choice.
Cable companies should be just carriers, without any power to interfere
in the communication between the user and the content provider (except
for cases where there is a court order with a particular objective). For
instance, if a peer-to-peer service is illegal in one country, it would be
legitimate to block this content. The decision would be based on laws and
regulation, not on private agreements with service providers.
Net neutrality works together with other internet principles to deliver
a service which is democratic and innovative. The internet works with
open standards to allow anyone to get inside the network. All the rules
of the internet are transparent. There is no censorship of what content
183
IS1181 Digital infrastructures for business
can be published (although people are responsible for the content they
publish and illegal content can be punished locally in accordance with
national legislation). With net neutrality, any two parts can interact on
the internet without interference of a third party. Without net neutrality, a
third party (ISPs, governments, mobile providers etc.) can interfere in the
interactions, reducing our degrees of freedom.
184
Chapter 16: Issues of net neutrality and national borders
186
Chapter 16: Issues of net neutrality and national borders
187
IS1181 Digital infrastructures for business
have the means to get better deals, instead of being the place for better
innovations from the perspective of users.
There are also reasonable arguments that different types of data should be
treated differently in accordance with the order of priorities of a society.
For instance, a society may decide that emails and voice data should have
priority over videos and that videos should have priority over games. This
would imply that every time a network is very busy, games and videos
would need to wait till the emails and voice messages been transmitted.
This is a sort of discrimination by type of data, which attend the needs of
users and service providers to maximise the benefits for society, without
empowering the service providers as gatekeepers. We can use a metaphor
here: ambulances and firefighters have priority in public roads and all
agree they should have priority for the good of society. A similar rule on
data priority could be defined by regulation, or by the contract between
the service provider and the final user (if the priority would be decided
by the user, not by the ISP). But this would not allow a service provider
to charge more for data coming from Google than the data coming from
Amazon, to give an example. In this model, net neutrality would not work
as it works today, but the freedom of accessing content from different
providers of same kind of information would be the same.
188
Chapter 16: Issues of net neutrality and national borders
The user would lose immensely. By contrast, with net neutrality, we have
the freedom to decide which content we want to access and the capacity
of reaching innovations and choosing when an innovation is good for us.
Without net neutrality, the ISP would somehow decide what the users
are going to access. Once you realise that Google Search does not work
anymore in your computer (or it works very slowly), you would use the
search in other interfaces which have business deal with your ISP.
The same logic of filtering can be done because of other reasons. Let’s
say that the owner of a powerful ISP has a political view on an issue, or
is supporting a candidate in an election (or even is the candidate in an
election). The company would be able to filter the content in its network,
favouring the good news about the candidate or political perspective
and eliminating the view of others, or the bad news about its candidate.
Indeed, many news companies have done this in the past and present,
filtering and curating content, pretending to be neutral to convince readers
of a particular perspective. The internet breaks the monopoly of truth of
too power communication companies: anyone can express their ideas and
people can share ideas freely. Once we allow ISPs, telecommunication
companies and governments to filter content, we can no longer be sure
of the quality of the information. We would also not be able to guarantee
we have access to a broad discussion of different perspectives. It would be
like parents who use the parental control software to decide which content
their children can access. The ISP can use similar filters to control which
content we can access if net neutrality is not protected.
Let’s take an example of discrimination by type of user. Suppose a big
corporation makes agreements with all ISPs in its neighbourhood to have
high priority in the delivery of internet services. This would mean that any
time the network is very busy, the company would have priority to receive
its information, with the implications that the internet would be slower
for all other users in the same area. In this case again, the ISP would
have the benefit of getting more fees for selling special services to the
big corporation, the corporation itself would benefit from having priority
in receiving information and the other users around would have worse
service quality, although they are paying a fee for the services. Probably,
the users would even not know that they are receiving worse services,
despite paying their subscriptions, because the service providers have
decided to make extra money selling priorities to the big corporation. How
often have you thought your internet connection slow compared it with
the quality of the services your provider has promised?
With net neutrality, we the users decide which content is good for us.
It could be otherwise if net neutrality is lost. At the extreme, each ISP
could decide which websites would be available or not in its network.
Indeed, we know very much how this would work, because we have
seen it before. Without net neutrality, the internet would repeat the old
model of traditional broadcast systems, in which the broadcaster curates
the content that audience can access. This traditional broadcast system
empowers the broadcaster and limits the options available to the audience.
In many countries, broadcasters have monopolistic positions in markets
as the only providers of communication and information services – such
as radio and television channels. If net neutrality is not present, the ISPs
and governments would be able to become the curators of content for the
users, with unthinkable damages to our freedom of choice. Just compare
the difference of access to content you have via television and YouTube.
189
IS1181 Digital infrastructures for business
190
Chapter 16: Issues of net neutrality and national borders
191
IS1181 Digital infrastructures for business
192
Chapter 17: Digital business platforms and digital infrastructures
Chapter outline
This chapter aims to develop the concept of digital business platforms.
The objective is to link previous discussion on digital infrastructures,
developing a conceptual framework based on the concept of platforms.
The chapter analyses examples of platforms in digital industries,
explaining the products, services and technologies they offer to enable
third party businesses. The perspective developed in this chapter relates
platforms to the concept of digital infrastructures, as they have many
similarities in terms of developing themselves in layers and enabling other
business to be built on the top of their existing layers.
17.1 Introduction
In previous chapters we have discussed digital infrastructures, focusing
mainly on the examples of the internet, the WWW, cloud computing,
mobile technology and social media. We have argued across this subject
guide that digital infrastructures grow in layers and that they are
fundamental for business innovation in contemporary economies, as they
enable many other businesses.
In this chapter, we conceptualise digital business platforms, which have
many similarities with digital infrastructures. In the same fashion as
digital infrastructures, digital business platforms evolve through time in
layers, enabling other businesses, which develop their business models,
products and services on top of these platforms. The key difference, from
the perspective of this subject guide, is that digital business platforms are
mainly information systems specialised in particular goods and services,
which run on the top of broader digital infrastructures.
For instance, the internet is a digital infrastructure, providing the
environment for all sorts of digital products and services we have
access to online. It is a very broad resource. The same applies when we
conceptualise social media as a digital infrastructure. We are talking about
hundreds of different applications which have enough similarities to be
aggregated into a category, but at the same time are very diverse. These are
very generic infrastructures, which bring together a large variety of layers.
Digital business platforms are more specialised, enabling a particular
segment of digital products and services, contributing to a well-defined
value chain or business exchange among economic players. For instance,
Facebook is a service which has become a fundamental layer of the
social media infrastructure. However, Facebook is also a digital business
platform, as it provides the infrastructure for other businesses to be
built on top of its service. Through APIs, Facebook allows companies to
build complementary apps such as games, to be used through Facebook.
Similarly, Amazon is one of the most important e-commerce layers
of the internet and mobile technology infrastructures and one of the
most important cloud service providers, being thus a layer of the cloud
computing infrastructure. However, Amazon is also a digital business
platform, allowing companies and developers to create apps and business
solutions on top of its services, increasing their capacity of reaching
193
IS1181 Digital infrastructures for business
customers (thus adding value to the business chains which connect those
companies and their customers).
From this introduction, we can see that digital business platforms
are closely related to digital infrastructures. We use the term digital
infrastructures to conceptualise the broader assemblages of information
systems (hardware, software, people, processes and governance layers),
which enable a very generic and large number of applications. The term
‘digital business platform’ refers specifically to the intermediary layer
which enables a particular set of more specialised products and services.
Digital business platforms are thus layers which operate on top of broader
digital infrastructures, enabling other layers to emerge.
194
Chapter 17: Digital business platforms and digital infrastructures
195
IS1181 Digital infrastructures for business
Another way to see this is to say that digital business platform is a market
place; as markets they benefit from network externalities and each party
(buyers or sellers) gains more benefits the bigger the numbers of the other
party. For instance, from a user perspective, the more developers of apps
in a mobile platform, the better. From the developer perspective, the more
users in a mobile platform, the better. From the platform’s perspective,
the more users and developers, the better so that economies of scale can
combine with network externalities. Because of network effects, there is a
self-reinforcing mechanism encouraging platforms to pursue growth and
we may have situations in which the winning platform takes the whole
market (or almost all of it). See, for instance, the comfortable position of
Facebook in the market of digital social networking, of Google in search
and advertising and of Android as a mobile operating system. In cloud
services, a large and important type of DBP there is in contrast, a highly
competitive bunch of big companies and less a sense of ‘winner take all’.
The emergence of digital business platforms has consequences for whole
industries if and when a digital business platform becomes a key player,
with other economic actors losing some of their relevance and market
power. The more powerful a DBP and the more other businesses become
dependent on it – locked in - there is an increasing chance that a bigger
share of value produced is transferred to the owners of the platform. We
see this in recent decades with the increasing revenues of companies
such as Apple, Amazon, Alibaba, Google, Microsoft or Facebook, to name
just a few. The more that economic agents become dependent on digital
technologies, the more value these platforms are going to have.
Digital business platform leaders, as powerful intermediaries, need to
balance competition and collaboration, not trying to squeeze the profit
margins of their users too hard. Here the term ecosystem is a good
metaphor: despite their powerful position, platform leaders need to keep
fostering the businesses which run on their platforms. They thrive when
their users thrive. This co-dependency between the platform and the
businesses it supports mean that the design evolution of a DBP needs
reflect this. For example, by supporting collaboration within the ecosystem
as technology evolves and recognising that changes in the platform are
going to affect all businesses related to it. A successful DBP cannot (or
should not) make such decisions alone without considering the impact on
the ecosystem.
198
Chapter 17: Digital business platforms and digital infrastructures
199
IS1181 Digital infrastructures for business
Relying on the perceived quality of its products and a loyal customer base,
Apple has been able to expand the sales of both, hardware and services,
changing its role in the digital industries. An important move in this
direction was the creation of the service iTunes, associated at first with the
iPod product. The iPod device is now (2022) almost totally superseded
by mobile phones, but it was very innovative in its day and carried digital
music (and other files too). However, the real value added by the device
was the possibility of buying songs through the iTunes platform, which
uses cloud services to store and manage music, videos, television shows,
audiobooks, podcasts and movies rentals. iTunes content is available on
the other Apple devices too. The interesting point about iTunes is that it
opened the door to a new business perspective for Apple. The company
adopted a business model of intermediating the business between the
final consumer and the recording companies, offering a platform to sell
individual songs (instead of CDs).
Apple develops operating systems and software which operates only on its
hardware/platform, creating an environment in which the final user has
a combination of hardware, software and services sourced from Apple. In
order to leverage the level of innovation in its platform, Apple has opened
the APIs of the web browser Safari and of the iOS for mobile devices. In
doing this, Apple has benefited from thousands of developers around the
world who have developed software solutions (apps) to run on top of
Apple devices and software. As with Google and Android, Apple launched
the App Store for selling the apps created by these developers, thus on the
one hand organising and managing the offer of apps in its platform and
on the other hand making viable a market to match users and developers,
which would not be easy without Apple intermediation. And of course, the
company gets a percentage of the value of all sales through the App Store.
Case 3: Microsoft
Microsoft has been a key player in digital industries for many decades.
The company started offering operating systems and office packages for
PCs. The Windows operating system is the most important system on
desktop computers and smaller servers and supports the larger Microsoft
platform. In addition the company is big in games consoles (Xbox). The
company offers many software packages as services such as Word, Excel,
PowerPoint, Edge, Outlook email and associated services (such as calendar,
contact lists and management of tasks) and collaborative platforms such
as Skype, SharePoint and Teams. By virtue of these services that are widely
used in business, Microsoft is a very significant digital business platform.
There are few businesses or other organisations that do not use some of
these products and services offered by Microsoft although the company
has competitors in all segments. Microsoft has also increased the range
of service platform offers to include significant industry leading cloud
services – Microsoft Azure. And its own mobile Windows operating system.
And in a similar way to other DBPs, Microsoft has an open API to allow
developers to create new apps to its platform.
200
Chapter 17: Digital business platforms and digital infrastructures
Case 4: Amazon
Amazon started as an e-commerce business: selling books on the internet.
Over many years, Amazon operated at a loss, as the market was not yet
mature enough to accommodate the e-commerce it engaged in. Gradually,
the company has become synonym for e-commerce for most of the
products a household may buy – and indeed many businesses also buy
products from Amazon. In addition to books, the company sells many
other categories of product, from entertainment ones (such as CDs and
DVDs), to clothes, furniture and food. Through selling a large range of
products, Amazon has established itself as a strong e-commerce channel for
a large number of people and businesses buying products online. Amazon
has added other services of review and rating to help customers to better
inform their decision. These services rely on user-generated content:
customers give their feedback on products and suppliers, using similar logic
to social media services.
Amazon has become a digital business platform through steps which
transformed the company from an online retail store to an online retail
mall and service provider. For instance, the company changed its business
model to start selling products of small and medium size retailers
(although big retailers can also use the platform). In this way, millions of
small and medium size businesses, which would find it hard to set up from
scratch to sell their products online, have entered the world of internet
sales. Amazon offers the platform for them to sell their products, with the
advantage that they do not need to invest either in the interface (having a
website) or in the security of payment (one of the biggest obstacles for any
company to selling products online). Communication with the customer is
also managed by Amazon and it can also handle the logistics.
In addition, Amazon has become a cloud computing provider. Relying on
its knowledge of how to manage servers, communication and security, it
was a logical step for Amazon to start selling cloud computing services to
third parties. The service supports online operations, meaning the client
does not need to have a server at all to run a particular business. A great
advantage of this model is that the client does not need to invest money
in a fixed infrastructure which may not be necessary for a small business,
at the same time that if or when the infrastructure becomes necessary, it
is immediately available through the cloud. In addition, the system can
be used for back-up databases and big data analytics. And to make the
platform even more attractive, Amazon has the Amazon API Gateway,
which allows developers to create apps to access data and functionalities
that a company is running on Amazon cloud services.
Case 5: WeChat
WeChat is a social media platform used mainly in China. Created by
Tencent, one of the biggest Chinese digital business companies, the app
could be better described as a super-app, which puts together a large set of
functionalities and features, from social media tools (connecting friends)
to instant messaging, purchasing and booking channels and payment
systems, among many other features and functionalities. WeChat has an
environment in which people can organise their digital activities fully. For
instance, if a person wants to book a restaurant or a service, WeChat offers
the features to have access to these services. The same app has the social
networks for organising a dinner, to book the restaurant, to order the food,
to split the bill among friends, to pay the restaurant and to request a cab
to go back home. All in one app (through the so-called mini programmes,
which are apps inside the main app).
201
IS1181 Digital infrastructures for business
202
Chapter 17: Digital business platforms and digital infrastructures
203
IS1181 Digital infrastructures for business
Notes
204
Chapter 18: Business models and digital infrastructures
Chapter outline
This chapter introduces business models and two frameworks to analyse
them. The first presents the key building blocks of a business model, with
a focus on how the parts fit together to form a robust system. The second
also focuses on key elements of business models but proposes a value
perspective aiming to understand better the innovation of business models
themselves. The chapter gives examples of business models, focusing
on companies which provide digital products and services supported by
digital infrastructures. Some of the business models discussed are digital
business platforms. The chapter does not aim to exhaust the discussion on
business models, but to provide a vocabulary and conceptual frameworks
for the student to explore other possibilities, especially thinking on
businesses that are enabled by digital infrastructures.
18.1 Introduction
This chapter presents the concept of business models, illustrated by some
examples. Considering the space limitations of this guide, this chapter
first summarises key ideas presented by Osterwalder, Pigneur and Tucci
(2005), of nine business model building blocks and the implications of
their views for the information system domain, which is our focus in this
subject guide. The content of this part is very close to the Business Model
Canvas, initially proposed by Alexander Osterwalder. You can learn more
online about the Business Model Canvas, which has been well accepted by
practitioners (see further readings below).
Next we present an alternative view on business models, which aims
to emphasise the need of innovating the business models themselves,
as proposed by Rayna and Striukova (2015) (the 360° Business Model
Innovation framework). This second view draws upon the literature on
business models and is quite similarly to the first perspective but it focuses
on the dynamic process of reinventing business models in competitive
environments. The authors argue that in very competitive environments,
such as among companies working with digital goods, it is necessary to
think how to innovate in business models.
It is important to have in mind that, as with any other academic topic,
there are a variety of views on the conceptualisation of business models
and how to apply these models in particular contexts. We present here
two views of this discussion, but you may explore other views through the
literature and future courses.
205
IS1181 Digital infrastructures for business
208
Chapter 18: Business models and digital infrastructures
209
IS1181 Digital infrastructures for business
Netflix
Let’s consider an example of a disruptive business model: Netflix. The
company was created in 1997, renting DVDs by mail service. Customers paid
per rental. In 1999, the company changed its subscription model, allowing
people to pay a fee for getting the right to see as many DVDs as they wanted
211
IS1181 Digital infrastructures for business
213
IS1181 Digital infrastructures for business
214
Chapter 18: Business models and digital infrastructures
and of all customers. AI is also used for voice recognition systems (such
as Natural Language Processing), which allow customers to communicate
with the banks with voice-command. Although this technology is still
precarious (particularly when customers have accents which are not
recognised by the AI), it is improving very quickly. Sentiment analysis is
also used by banks and financial institutions to improve the quality of their
customer services. Sentient Machines, for instance, is a company providing
fintech solutions based on AI, for recognising the feelings of the customers
when contacting the bank. The system can, for instance, identify when a
call is urgent, to give the customer the right level of priority and the access
to the right professional.
216
Chapter 19: Smart cities
Chapter outline
This chapter explores the concept of smart cities to show how digital
infrastructures can be combined with physical infrastructures and
embedded in communities, in order to improve the management of cities
around the world. The chapter discusses some challenges for smart city
solutions and the cases of Singapore and Amsterdam, two examples of
smart cities around the world.
19.1 Introduction
The term smart city has been used to define urban developments which
integrate information and communication technologies to better manage
cities and improve the quality of life of people in cities. The idea is
to have digital technologies integrated with the life of the city, from
government departments and transportation systems to schools, hospitals,
entertainment and leisure, energy and water supply networks and waste
management, among other areas. Being more efficient and capable of
controlling outputs, smart cities aim to save public money but more
importantly to and deliver better services to citizens. The concept of smart
cities is very broad and used in different contexts to represent a large
range of possibilities in terms of using digital infrastructures to manage
urban spaces and serve citizens.
217
IS1181 Digital infrastructures for business
Saunders, T. and P. Baeck ‘Rethinking smart cities from the ground up’
(18th June 2015). NESTA Publications. https://www.nesta.org.uk/report/
rethinking-smart-cities-from-the-ground-up/
218
Chapter 19: Smart cities
As you would expect, smart cities evolve over time on the basis of
developing underlying infrastructure and allowing innovations in how it
is used. The city needs to be connected by a digital infrastructure such
as the internet (fast broadband) and have wireless access everywhere, to
collect the necessary data. Electronic sensors and RFID (Radio Frequency
Identification) can be connected to things which can generate data, thus
building an IoT infrastructure. Data analytics can propose which pieces of
information are relevant and how to analyse these by mathematical and
statistical models and AI analytical tools (using machine learning).
Parking spaces
Related to the problem of traffic, there is the problem of how to find a
parking space in high populated cities, especially in central areas, where
parking is more controlled and difficult. Information on parking spaces
can be measured by sensors. Again, the information would be aggregated
centrally and informed back to those who are interested in finding a
parking space, considering their location (informed by GPS systems). The
matching of parking space and vehicle looking for a space can be done
219
IS1181 Digital infrastructures for business
Government services
This item includes all forms of services that can be improved and be more
efficient when delivered through digital infrastructures. For instance, city
governments may offer online information about all services provided,
booking services, such as the collection of waste or the cleaning of a
public area and online access to the electoral register. They may also offer
payment interfaces, for instance, allowing payment of council/city taxes
online, without going to a bank. The focus here is on the management
of governmental services which are provided by other means and gain
efficiency and quality through the redesign of solutions supported by digital
infrastructures, platforms and applications, such as the internet, the IoT
and big data. E-services also target reducing the amount of paper used,
thus having an element of green IT solutions. In order to make this access
easier to citizens, local and national governments may issue smart cards, i.e.
electronic identification cards which allow citizens to have access to many
e-government services using the same online identification. This enables
citizens to avoid having to register for different services and manage different
accounts when using services provided by the same government office.
222
Chapter 19: Smart cities
potential benefits from creating a physical and digital infrastructure for the
electric vehicles, integrating them into the data management systems, can
be enabled by smart city projects.
223
IS1181 Digital infrastructures for business
Singapore
Singapore launched in 2014 its Smart Nation programme, aiming to
become one of the most interesting examples of how digital infrastructures
can support the emergence of a smart city. The government promises
to deliver better quality of life, greater integration of communities and
urban developments which are sustainable across generations. The
224
Chapter 19: Smart cities
official guidelines say the adoption of smart city solutions will improve
government services through digital infrastructures. In addition, the
government wants the investments to foster innovation. To support this
aim, it has created the Jurong Innovation District, which brings together
researchers, entrepreneurs and students to develop products and services
coherent with the proposition of smart city projects.
The Smart Nation programme is possible because the government
systematically collects data about the daily activities in the city, through
sensors and cameras. The collected data is aggregated in an online
platform called the Virtual Singapore, which allows the government
to observe in real time how the city is working. Data collection and
processing enable services. For instance, connected citizens are informed
about public transport, traffic and parking spaces in real time, allowing
people to crowded parts of the transport network and choose better
driving routes. Gradually, the digital infrastructure of Virtual Singapore
should evolve to more ambitious goals, such as controlling how infectious
diseases spread through the population and how crowds react in the event
of an explosion in a public space. Drivers could have additional sensors
in their mobiles to measure the movement of their cars in the streets,
informing the government when a road needs maintenance. Sensors
connected to elderly citizens may inform if they lose consciousness or need
help or healthcare.
From a legal perspective, digital infrastructures can support law
enforcement, although sacrificing privacy. For instance, by controlling
whether people are smoking in prohibited areas or littering public spaces.
Under Singapore laws, the government can install sensors and collect data
for reasons of law enforcement or even simply surveillance of citizens.
The Singapore government owns most of the buildings in the city, so it is
very easy to make decisions to add sensors and cameras. These sensors
can measure everything about the building (materials, dimensions), but
they also measure everything about the way people move in the building
and use their own space. For instance, a person could be photographed
throwing cigarette butts in the street, allowing the government to fine the
individual for disrespecting the law.
The Smart Nation programme is evolving gradually, and it is not clear how
data will be used in the future. For some people, this system empowers the
government to increase the surveillance of society. Other people agree that
the government has the right to invigilate citizens, to be sure the law is
respected.
Amsterdam
Amsterdam Smart City programme was launched in 2009. One of the
goals of the programme is to look for a balance between the visitors and
the residents of the city, and between the need of economic growth vis-à-
vis the necessity of fostering long-term sustainability. The programme has
dozens of projects across the city, many of them at the testing/pilot stage.
A key pillar of the programme is the open source data approach. The
government has made an investment to consolidate and clean thousands
of datasets from different departments, to create a meaningful, reliable
dataset. Individuals and companies can access public open source data to
create applications and services. This data is provided in real time, through
digital infrastructures, and developers can use an open API to create
solutions using public data. For instance, developers may use the data
about transportation systems and traffic to guide citizens about the better
225
IS1181 Digital infrastructures for business
public transport and road options at any given moment. Data analytics
and data modelling on traffic can be used to reprogramme the traffic lights
during the day according to traffic flow needs. This smart solution can
reduce traffic substantially, through adapting the model in real time in
accordance with the most recent information.
There are projects which rely on the help of citizens to collect data on
air pollution and noise, through sensors attached to mobile phones. On a
large scale, the government can map energy consumption across the city,
enabling it to propose better use of solar energy in the neighbourhoods
that need it most. The energy generated during the day can be stored in
electric car batteries, which can provide energy to households as necessary.
Smart meters support better energy management in residences and offices.
In addition to products and services, Amsterdam invests in the creation
of Living Labs. The idea is to create small clusters of each product and
service, which are tested, before replicating for the whole city and
beyond. For instance, projects testing personalised television systems and
transportation services, or researching the impact of co-working spaces in
the use of energy and generation of pollution. These co-working spaces
depend on efficient digital infrastructures to allow employees to work
remotely and efficiently. The idea of fostering the engagement of citizens is
behind some of the smart city projects in Amsterdam, in order to get more
people participating in knowledge sharing and innovation, in addition
to influencing public policies. For instance, the Amsterdam Institute for
Advanced Metropolitan Solutions sponsored the project Beautiful Noise,
analysing social media data posted by residents and tourists to capture in
real time events such as long queues in museums and formation of crowds.
226
Chapter 19: Smart cities
227
IS1181 Digital infrastructures for business
Notes
228
Chapter 20: Reflections on the course: the future of digital infrastructures for business
Chapter outline
This chapter summarises the key arguments of the course and prepares
you to study and research further related topics. The first objective is to
help you understand how the whole course comes together and to allow
a better understanding of the big picture of digital infrastructures for
business. A second objective is to motivate you to keep up you research
on related topics, as innovation in digital infrastructures is opening new
business frontiers every day.
20.1 Introduction
Our goal in this course is to provide a broad understanding of digital
infrastructures for business. As this is an introductory course, we have
been careful to add gradually more details on complex topics, which will
be developed further in later courses. We have balanced the technical
and the businesses aspects, giving you enough information to form a
view of the interplay between the two aspects of digital technologies.
Even for business students, it is necessary to have a degree of technical
knowledge in order to better understand how digital infrastructures evolve
and enable new opportunities. This knowledge also will help you to have
better conversations with technical colleagues in business environments,
increasing your chances of having more productive and successful
collaborations.
We have balanced the content of this subject guide to cover facts and
theories, again taking into consideration that this is an introductory course
so a selection of relevant theories and models have been introduced and
then applied to topics. It is important that you understand how such
theories can give more depth to your analysis of digital infrastructures and
better prepare you for the job market in the future. As we hope you have
learnt from this course, innovation in digital technologies advances quickly,
with serious implications for organisations, business sectors, individuals
and societies. We can get lost if we focus only on the technical aspects of
innovation and uncritically accept the latest gadgets or business models.
In this rapidly changing domain theory (or rather theories) can help you
understand more and make better judgements as innovations arise.
In this chapter we provide a summary of key ideas and theories discussed
in this guide and then introduce some emerging topics for your further
research and reflection. These topics are chosen because they are
innovations that are being created and first put to use now and some of
them they may become significant in your professional life hereafter. It’s
best to be prepared for the challenges.
229
IS1181 Digital infrastructures for business
230
Chapter 20: Reflections on the course: the future of digital infrastructures for business
231
IS1181 Digital infrastructures for business
232
Chapter 20: Reflections on the course: the future of digital infrastructures for business
233
IS1181 Digital infrastructures for business
On a broader scale, the IoT can create, for instance, smart electrical
grids, intelligent transport systems and smart cities, changing the way
governments and private companies manage urban spaces. Imagine an
electrical grid in which all devices are connected to the same network
and the grid itself can decide which time is the best to do some tasks
at home – for instance, washing clothes or heating water – when there
is excess of energy in the system. Or an intelligent transport system
which automatically directs passengers, cars and buses to the fastest
routes in accordance with the information received from other vehicles
in the network, avoiding traffic. Or an IoT infrastructure helping a city
to manage in a more intelligent way schools, hospitals, services, power
plants, water supply and waste management. These activities, individually
and integrated together, can be better managed using the information
from diverse sensors. The result could be reduction of costs and waste and
the improvement of the quality of services, through better productivity,
less pollution and greenhouse gasses.
IoT has other potential applications, for instance in self-driving vehicles
and electric powered – cars, buses and trucks. Vehicles can quite easily
understand maps to go from point A to point B without a human driver
and petrol engines can be changed to electric motors. But how to do
it safely and reliably? For that we need to understand many material
elements in the external context – such as other cars, bicycles, buildings,
people and animals, weather, charging points, journey plans etc. This
needs a lot of data to be collected and then processed – probably remotely
by multiple dedicated services. The development of electric vehicles
and self-driving cars calls attention to another familiar phenomenon: all
infrastructures evolve and grow, drawing on an installed base. The new
digital transport infrastructure emerging builds on and extends existing
transport infrastructures (roads, gas stations, maps) and blends this
with mobile digital communications. We can foresee a new transport
infrastructure built on top of digital infrastructures – including smarted
electric vehicles, public transport, trains, bicycles, ships and aeroplanes.
A final development which is going to deeply affect the future of
computing and its implications for businesses is AI (Chapter 15). Our view
is that the day when computers will be able to match the human brain
(what some call the Artificial General Intelligence) is far off. However,
there are some narrower and specific areas in which computers are already
better than humans, for instance, managing massive volumes of data and
finding unknown patterns (associations between data points). In addition,
computer scientists have learnt that one successful way to build AI is
through mechanisms which mimic the process of human learning. Instead
of trying to develop a software programme which ‘knows’ everything,
better to have a programme which can learn from past experience – e.g.
from databases and from interaction with humans. This is known as the
machine learning (ML) approach. To some degree, using ML, programs
can interpret natural language (spoken or written) and answer questions
on relevant topics, looking for a perfect match or anything meaningful,
within a range of probabilities, in the same way human beings do.
By combining big data with ML techniques AI today has become a very
viable digital service. It is not about ‘knowing’ everything, but learning how
to learn in specific domains and making a better estimation of probabilities
to match questions to answers. Even better, having developed general
models of learning, they can be applied to the learning of other topics
that has a suitable body of data to be analysed. Once an AI algorithm is
trained for a task, the cost of reproducing that algorithm (AI as a Service)
234
Chapter 20: Reflections on the course: the future of digital infrastructures for business
235
IS1181 Digital infrastructures for business
236
Chapter 20: Reflections on the course: the future of digital infrastructures for business
the process of ‘learning how to learn’. We have tried in this subject guide to
show you some steps in this direction. Many of our activities are about you
doing your own research to find your own answers to problems. Instead
of trying to present ‘all that you need to know’ about a topic, this subject
guide tries to tell you a story which fosters your interest in looking for more
information through the recommended readings and through your own
research. In doing the activities in this guide, you become more capable of
taking the process of learning a complex topic in your own hands.
237
IS1181 Digital infrastructures for business
238